The 1% Who Put the Entire Organization at Risk

Cyber-security risk is highly concentrated in the cloud, according to a new study, with 1% of users responsible for 75% of the risk. Furthermore, cyber-criminals continue to focus on what is widely considered the weakest link in the security chain: the user, the report revealed. The findings come from CloudLock, which combines U.S. and Israeli military intelligence with real-time,... Read More »

Reducing the Time an Intruder Spends in the Network

A majority of IT security executives are only somewhat confident in their enterprise's security, according to a new survey. One-third of respondents are confident in their security posture and one-quarter said they communicate effectively about security metrics and posture to senior management. These executives continue to rely mainly on quantitative metrics aimed at preventing breaches.... Read More »

Why Passwords Are Skeleton Keys of the 21st Century

Passwords are an archaic form of security, and it's time to implement more stringent security, including voice biometrics.

Read More »

The Return of the Malicious Attachment

Malicious attacks have shifted from URL-based campaigns, which dominated last year, to campaigns that rely on attachments to deliver malware payloads, according to a new study. The study also found that phishing increasingly targets business users, and that social... Read More »

How CISOs Help Create Order Out of Chaos

You have to know what you have in order to protect it, and CISO Tammy Moskites has all the right ingredients to help organizations protect their assets and reputations.

Read More »

Safeguarding Data in the Era of BYOx

Protecting your organization’s data is of paramount importance, yet so is empowering employees to use their own devices. Can security pros handle this balancing act?

Read More »

Why Insider Threats Are Inevitable

The majority of surveyed security professionals, 62 percent, said insider threats have grown during the last year, according to a new report. A combination of factors are at play: 53 percent attribute the rise to insufficient data protection strategies and solutions, 50 percent point to the proliferation of sensitive data moved beyond the firewall on mobile devices, and 50% note a lack of... Read More »

The Key to Battling Cyber-Crime Begins With Users

A day doesn't pass without news of a breach or security lapse somewhere in government or business. As a result, Americans are increasingly concerned about the risks posed by digital systems. Yet many do not follow basic security practices that reduce dangers. A new national survey of more than 1,000... Read More »

Your Organization Is Infected–Now What?

Protecting your network from ransomware is an integral part of any network security framework for both individuals and companies. It's also important to have a plan of action once you know you've been stricken. Stu Sjouwerman, founder and CEO of KnowBe4, realized that the human element of security was being seriously neglected, so he teamed up with Kevin Mitnick, a computer security... Read More »

8 Reasons to Update Your Approach to Data Security

It's time to shift your thinking about data security, according to security and data experts at DataGravity, a data-aware storage platform. "Many people consider data security to be synonymous with perimeter security," said Perry Dickau, director of product management at DataGravity. "However, with the rise in data breaches in today's IT... Read More »

Read More From Our Security Archive »
Thanks for your registration, follow us on our social networks to keep up-to-date