Why Passwords Are Skeleton Keys of the 21st Century

Posted : 08-28-2015

Passwords are an archaic form of security, and it's time to implement more stringent security, including voice biometrics. Read More »

The Return of the Malicious Attachment

Posted : 08-24-2015

Malicious attacks have shifted from URL-based campaigns, which dominated last year, to campaigns that rely on attachments to deliver malware payloads, according to a new study. The study also found that Read More »

How CISOs Help Create Order Out of Chaos

Posted : 08-21-2015

You have to know what you have in order to protect it, and CISO Tammy Moskites has all the right ingredients to help organizations protect their assets and reputations. Read More »

Safeguarding Data in the Era of BYOx

Posted : 08-20-2015

Protecting your organization’s data is of paramount importance, yet so is empowering employees to use their own devices. Can security pros handle this balancing act? Read More »

Why Insider Threats Are Inevitable

Posted : 08-19-2015

The majority of surveyed security professionals, 62 percent, said insider threats have grown during the last year, according to a new report. A combination of factors are at play: 53 percent attribute the rise to insufficient data protection strategies and solutions, 50 percent point to the proliferation of sensitive... Read More »


Thanks for your registration, follow us on our social networks to keep up-to-date