SECURITY

Subscribe
 

How Digital Assets Strain IT Security Efforts

A notable number of IT security professionals said a corporate mindset that current measures are “good enough” presents a major obstacle in the pursuit of new security initiatives, according to a recent survey from CompTIA. The resulting report, titled “Practices of Security... Read More »

How State Governments Struggle With Cyber-threats

With phishing, social engineering and ransomware emerging as significant threats, state governments are increasing their efforts—and boosting their budgets—to enhance their cyber-security programs, according to a recent survey from Deloitte and the National Association of State Chief Information Officers... Read More »

Top Tips to Secure the Data Center

Securing a data center can be challenging for a variety of reasons. You can't secure what you don't see, for example, and almost everything has remote access capabilities and IP addresses to interface with the web. Too often, security takes a backseat, which leaves hundreds of embedded and... Read More »

How CIOs Should Convey Cyber-Risks to the Board

Half of IT and security executives risk losing their jobs if they fail to provide useful, actionable information to their company's board, according to a recent study. The report, "How Boards of Directors Really Feel About Cyber Security Reports," also reveals a... Read More »

What CISOs Need to Combat Their Counterparts

The tech world has been in constant motion while CISOs have been building defenses to ward off attackers, and the changing landscape has created entirely new responsibilities for security professionals, according to Greg Mancusi-Ungaro,... Read More »

10 Ways to Mitigate Healthcare Security Risks

A steady cadence of hospitals fell victim to attackers exploiting old or outdated vulnerabilities that could have been fixed. In June, a hacker reportedly sold 655,000 patient records on the Dark Web. That ballooned to 9.3 million patient records after attackers accessed patient names, Social Security numbers, gender, insurance data and other information. One reason for the series of... Read More »

Sending the Right Message on Risk Management

Without one person in an organization responsible for managing third-party risk, companies face a serious barrier to achieving effective third-party risk management, according to a new study. The study, "Tone at the Top and Third-Party Risk," was conducted by the Ponemon Institute and sponsored by Shared Assessments, a member-driven, industry-standard body specializing in third-party risk... Read More »

New Cloud Users Put the Business at Risk

By now, CIOs and their IT teams must think that they've spent countless hours talking to their organization's employees about the inherent dangers of the Internet age. But risky user behavior is still alive and well, according to a recent survey from Softchoice. The report, titled Read More »

When False Positives Waste Tech Team’s Time

C-level executives are "completely in the dark" about cyber-attacks against their companies, yet IT professionals revealed their organizations have been victims of advanced attacks during the past 12 months. Many security pros do not believe their company has the necessary intelligence to convince the C-suite about the threats their company faces. They also are misled by false positives. The... Read More »

How to Avoid Becoming Easy Prey for Visual Hackers

With executives and essential staff conducting business in airports, open workspaces and even coffee shops, the threat of visual hacking is a very real one.

Read More »

Read More From Our Security Archive »