SECURITY

Subscribe
 

12 Tips for Communicating Risk to Your Board

Communicating risk posture and assessments to the highest levels of an organization is a demanding and increasingly pivotal responsibility in businesses that rely on IT. In a world of proliferating new threat vector and information risks , every CIO must be skilled in communicating the value of IT security to the business. By presenting this connection to the board, information chiefs show... Read More »

The Rise of Cyber-Crime as a Service

This year began with explosive growth in ransomware domains, according to a DNS threat index, driving an all-time high in new malicious domains. The threat index, which measures the creation of malicious DNSs including malware, exploit kits, phishing and other threats, was created by Infoblox, the network control solutions provider. "There has been a seismic shift in the ransomware threat,... Read More »

Nine Tips for Agile DDoS Protection

DDoS is a disruption that plagues digital businesses. Unfortunately, it is growing and evolving rapidly. First-generation DDoS detection techniques were limited by scale-up computing models. Now, new, scale-out, big data technologies are providing nearly limitless capacity to handle modern networks. As a result, "Savvy NetOps and SecOps teams are taking a less static and more adaptive stance... Read More »

How Ransomware Victimizes Millions

Four percent of Americans, or 13 million people, have been targeted by ransomware, malicious software that blocks access to a computer or computer system until the victim pays a sum of money. Ransomware caused $350 million in damage last year, "living up to its reputation as the most significant menace targeting Internet users and organizations to date," Read More »

The High Risk of Third-Party Apps

The cloud, combined with an explosion of third-party cloud apps, is posing major security issues for enterprises, according to a new study. The report, "The Explosion of Apps: 27% Are Risky," was conducted by the cyber-lab of CloudLock, a security vendor. "The shift to... Read More »

How to Avoid Becoming Easy Prey for Visual Hackers

With executives and essential staff conducting business in airports, open workspaces and even coffee shops, the threat of visual hacking is a very real one.

Read More »

Cloud Apps Rise Despite Cloud Security Concerns

Cloud computing spend grew 20 percent last year, but security of critical data and systems remain key issues and barriers to adopting cloud services. As a result, cloud security concerns are rising as investment in it grows, according to a new report by Crowd Research Partners, but that's not stopping companies from using the cloud. The study, "2016 Cloud Security Spotlight Report," was... Read More »

How More Cloud Services Put the Business at Risk

By now, CIOs and their IT teams must think that they've spent countless hours talking to their organization's employees about the inherent dangers of the Internet age. But risky user behavior is still alive and well, according to a recent survey from Softchoice. The report, titled Read More »

Outdated Security Creates an IoT Danger

The IT community must immediately address Internet of things security because there is a dire need for advanced security for agentless devices, a study revealed. IoT devices are often not addressed in companies' security policies, if indeed any policy exists. In addition, the perceived penetration by respondents of IoT devices is low and they are not confident that their perception is... Read More »

Super Bug Hunters Collect Millions in Bounties

More organizations are adopting bug bounties—incentivized programs that encourage security researchers to report security issues to a sponsoring organization. Bug bounties are moving from novelties to best practices, helping to strengthen the security of products. "2015 was the year companies realized that when it comes to cyber-security, the pain of staying the same is exceeding the... Read More »

Read More From Our Security Archive »