SECURITY

Subscribe
 

Why IT Security Will Remain a Top Priority in 2017

A significant number of CIOs, along with other C-suite executives and managers, reported that their technology budget will see major increases this year, according to a recent survey from Mondo. The accompanying "2017 Tech Trends and Talent" report indicates that cyber-security is at the top of... Read More »

The Disconnect Between Breaches and Solutions

The average company suffers two or three security breaches a month, a new survey reveals, and yet a majority of security executives said they are confident in their ability to protect their enterprises from cyber-attacks. The report, "Building Confidence: Facing the... Read More »

10 Ways to Deal With Hacktivist Attacks

Hacktivist attacks affect everyone. You don't have to be a high-profile oil or pharmaceutical company to suffer from one. Just combining personal and work activities while online, posting too much information to social media or otherwise attracting unwanted attention could make you a magnet for hacktivists. Defending against hacktivist attacks is not straightforward. Hacktivists are not... Read More »

10 Reasons Why Social Media Compliance Matters

Companies are challenged every day to figure out how to balance the risks versus rewards in allowing social media communications and permitting the use of personal networks to promote the business. Preapproval of social communications can mitigate risk, but that impacts the timeliness of the communications. Social networks fight continual battles to keep their own sites secure, and the... Read More »

Poor Password Habits Can Endanger Business

Although most individuals know what safe passwords should be, most people tend to ignore what they know and instead use easy-to-remember passwords because their fear of forgetting is stronger than their fear of being hacked, according to a recent study on the... Read More »

Rewards and Risks of Software-Defined WANs

Distributed denial of service (DDoS) attacks are escalating in frequency and scale, and the traffic they generate is sudden, massive and completely unpredictable. Almost any technology-savvy person with a computer and an Internet connection can marshal an army of bots and servers to cripple and quickly overwhelm targets, shut down sites and cause collateral damage. Most hardware-based... Read More »

New Cyber-Security Model Spurs Innovation

Forward-thinking organizations are adopting a new model for cyber-security that acts on analytic inputs and adapts to evolving risks and threats, said a new report from PwC. As a result, cyber-security is leading to innovations. The new approach includes data analytics and real-time monitoring, managed security services, advanced authentication and open-source software. The study, "Read More »

The Top Risks for Organizations in 2017

If fears about the year ahead are keeping you up at night, you're in good company: Corporate board members and executive leaders have plenty on their minds these days, according to a recent survey from Protiviti and the Enterprise Risk Management (ERM) Initiative at North Carolina State University's Poole College of Management. The accompanying report, "Read More »

Securing New Technology in the Public Sector

Emerging technologies are making their mark on public service, but secure management is vital to national security and to the delivery of citizen services.

Read More »

Scarcity of Security Pros Advances Automation

A shortage of qualified cyber-security professionals and heavy reliance on manual security are driving companies to use automation to respond to security incidents, according to a survey sponsored by security and automation firm Hexadite. The Enterprise Strategy Group... Read More »

Read More From Our Security Archive »