Enterprises are no doubt wondering what will hit them next. Here’s a handful of answers about what’s possible
Read post
Though designed to do harm, It had all the trappings of a real business, including some high-profile “case studies” like Microsoft and Sony
Read post
Our monthly roundup of the most interesting discussions on the industry’s popular discussion forum, including security threats, the IoT and more
Read post
Research from Cisco and IDC suggests that firms here shouldn’t be complacent about their ability to protect data
Read post
A recent Ciena Webinar brings includes an expert who suggests it’s time to rethink the way we approach data protection
Read post
MEF co-authors a white paper which suggests online experiences could soon look a lot better — and safer
Read post
The research suggests that distributed denial of service attacks are only getting worse, but throwing up your hands is not an option
Read post
Lance Spitzner makes a stop at the recent SecTor conference to discuss a longstanding issue in IT security: the human factor
Read post
At the recent SecTor conference, Ray Boisvert discusses the kind of attacker that’s likely to strike organizations, and what they should do
Read post
An IDC research study shows IT leaders are surprisingly open to feedback on device policies, but it needs to work both ways
Read post
Everyone will be asking network admins about iCloud backup, but recent Arbor Networks data suggests there are bigger concerns
Read post
What kind of chief information security officer would suggest that a key portion of his role includes “making friends?” Jamie Rees, that’s who
Read post
Execs from TMX Group, Bank of Tokyo-Mitsubishi UFJ Canada and LoyaltyOne discuss their philosophy around data protection at SC Congress
Read post
Bad mental habits can inhibit innovation. How thinking like Houdini can help CIOs find a way out of constraints
Read post
A senior executive gives a rare glimpse into the myriad threats to its systems and customer data, and the most important tool to mitigate them
Read post
A flaw in OpenSSL could have been prevented — and so should all kinds of other vulnerabilities that keep coming up
Read post
The security hole that’s been talked about around the world will provoke a lot of questions. Here’s how best to answer them quickly
Read post
Today’s IP news roundup highlights some of the latest headlines in network, IT security, and data analytics:
Tips for dealing with massive DDoS attacks: A recent ComputerWorld India feature outlines the top five tips for CIO and technology decision makers to manage the rise of DDoS Attacks....
Read post
A Gartner analyst warns that companies are facing a dilemma in conducting thorough inspections while ensuring traffic can flow freely
Read post
Our weekly roundup of what’s worth reading online includes stories about NGFWs, IT budget cuts, mobile ransomware and more
Read post
Cisco’s 2014 Annual Security Report contains information about the specific techniques being used against various vertical markets. Better watch where you (and your coworkers) are Web surfing
Read post
As gadget-lovers marvel at the future of consumer technology at CES 2014, IT professionals need to be aware of the evolving nature of security threats that will follow
Read post
Authentication for banking transactions has become more complex due to increased risk, but the must be taken off the user. Biometrics could be the answer
Read post
Today’s hackers are sophisticated, and it’s becoming harder for organizations to stay one step ahead of attacks. This is why SearchSecurity.com has created an Essential Guide to dealing with advanced threats. The guide explains which threats are changing the fastest and offers advice on how to...
Read post
Today’s IP news roundup highlights some of the latest headlines in network, cyber and data security:
Respondents to Ponemon Institute’s latest global cyber crime study experienced an average of 1.4 successful cyberattacks per week in 2013. This is an increase of 20% from last year. The...
Read post