New Cloud Users Put the Business at Risk

Posted : 09-13-2016

By now, CIOs and their IT teams must think that they've spent countless hours talking to their organization's employees about the inherent dangers of the Internet age. But risky user behavior is still alive and well, according to a recent survey from... Read More »

When False Positives Waste Tech Team’s Time

Posted : 09-06-2016

C-level executives are "completely in the dark" about cyber-attacks against their companies, yet IT professionals revealed their organizations have been victims of advanced attacks during the past 12 months. Many security pros do not believe their company has the necessary intelligence to convince the C-suite about the... Read More »

How to Avoid Becoming Easy Prey for Visual Hackers

Posted : 09-06-2016

With executives and essential staff conducting business in airports, open workspaces and even coffee shops, the threat of visual hacking is a very real one. Read More »

Why Securing Privileged Accounts Is a Must

Posted : 08-29-2016

A new study reveals security gaps in how organizations manage and secure their privileged account passwords and network access. “The 2016 State of Privileged Account Management Report” by Thycotic, a provider of privileged account management (PAM), and Cybersecurity Ventures, a research and market... Read More »

Managing Mobility Is a Major IT Challenge

Posted : 08-22-2016

Enterprise mobility presents numerous benefits: increased productivity, potential cost savings and improved employee morale. It comes with many potential risks. Between "bill shock" from uncontrolled roaming costs to user negligence causing unmanaged overages to to data loss, managing mobility can be a major challenge.... Read More »