We talk to Mike Vamvakaris about the current threat landscape, how it’s evolving and why Zayo is launching a Global Security Operations Center.
Read post
Financial services firms face up to 50 DDoS attacks per month and require 98 days on average to locate them, according to research from the Ponemon Institute. This new reality requires a new approach to mitigate risk.
Read post
Our monthly roundup of the best discussions on the online community, from phishing attacks to protecting your network from disgruntled techies.
Read post
Today’s hackers are sophisticated, and it’s becoming harder for organizations to stay one step ahead of attacks. This is why SearchSecurity.com has created an Essential Guide to dealing with advanced threats. The guide explains which threats are changing the fastest and offers advice on how to...
Read post
According to an F5 white paper, financial services organizations are facing a number of challenges – from decreased customer loyalty to increased regulatory burdens to growing concerns about application downtime and data leaks. All of these challenges are causing financial institutions to look...
Read post
As cybercriminals become more sophisticated and aggressive, it will become more likely that someone will stage a targeted attack against your company. Reduce I! Second soap essay on my loving grandmother they a must stand-up. Concentration essay wrting service Individual think end: best essays...
Read post
One of IT’s biggest challenges is keeping data secure while allowing users to access corporate information via a variety of devices. CDW’s comprehensive reference guide, “Securing BYOD”, offers data protection strategies and best practices. It covers everything from securing enterprise...
Read post
According to an Imperva white paper, “While the data center contains the highest concentration of sensitive data and critical business applications, it tends to have the weakest security controls, leaving much of this highly sensitive and business-critical data vulnerable to cyber attacks.” The...
Read post
According to a Webroot white paper, “Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most...
Read post
Intellectual property theft and cyber crime costs US businesses $338 billion annually. According to an Imperva ebook, “your organization is only as strong as your weakest link”, and “everyone is a target”. To help you better protect yourself, the ebook outlines eight steps you must take to...
Read post
If more of your employees are saving corporate information to their mobile devices, it may seem as though you are losing control of your endpoint backups. A Code42 white paper outlines the top five epic fails of endpoint data protection and offers tips on how to better protect your data. For...
Read post
BeyondTrust Software Inc. recently published the results of its “Headline vs. Reality: Survey Report” on how IT security professionals prioritize. The survey “identifies what threats they’re most concerned about, where they believe their IT assets are vulnerable, and what security...
Read post
CDW published a comprehensive reference guide, “Securing BYOD: Guidelines on the strategies and tools needed for a secure and productive bring-your-own-device program”. The guide covers everything from enterprise mobility management to what to look for in data loss prevention software. For more...
Read post
Mobile is no longer a trend but a vital part of how we do business today. However, when employees use their mobile devices to access corporate data, they can put your network at risk. CSO has published an issue that is dedicated to mobile security and will show you how to protect your network while...
Read post
According to McAfee’s Securely Enabling Social Media report, “the financial loss associated with a social media security incident averages $2 million USD,” while large organizations lose an average of $4.5 million USD. The report outlines the pros and cons of using social media at work, as...
Read post
The Cisco 2013 Annual Security Report revealed that the cloud will account for nearly two-thirds of global data centre traffic by 2016. However, this increase in cloud data is also leading to increased security concerns.
According to the report, “This explosion in cloud traffic raises...
Read post
Websense has released its “2013 Threat Report”. According to the report, “Our researchers measured a nearly 600 percent increase in the use of malicious web links, representing over 100 million new global malicious websites. More alarming was the news of CISOs reporting that most threats...
Read post
It seems like, every day, a major data breach makes headlines and new reports present conflicting research on data loss. McAfee’s new white paper, “Data Loss by the Numbers”, reveals the findings of an in-depth analysis of 386 data breaches. According to the investigation:
External...
Read post
Although no one wants to think about this, your own employees can be one of your biggest threats. A recent study revealed that 32% of employees have admitted that they stole confidential corporate information. To help you keep your data secure, SpectorSoft has released a white paper - “Six...
Read post
As attacks become more sophisticated, organizations must use more advanced intelligence to protect themselves from threats. A Solarwinds white paper provides an overview of the latest types of attacks and offers a framework for ensuring that you are protected from even the most sophisticated of...
Read post
Ponemon Institute released the results of its 2012 Cost of Cybercrime Study: United States study, which sheds light on the real economic impact of cyber attacks. The study revealed that ““the average annualized cost of cyber crime for 56 organizations in our study is $8.9 million per year, with...
Read post
In 2011, there was an average of 14 targeted attacks per day against small and medium businesses (SMBs). According to this Symantec article, “the risk to the overall livelihood of the SMB is much greater than the typically more protected enterprise. With less protection in place and less cushion...
Read post
With a growing number of employees using iPads other tablets to access business data, IT departments are looking for the best ways to keep these devices secure. Ziff Davis has published a white paper, “6 Steps to iPad Protection” that outlines how to control the massive amount of corporate data...
Read post
A network breach is bound to happen to every organization at some point. This short but informative Websense white paper offers advice on how to prepare for the unexpected – so you’re not left with a blank piece of paper when your CEO asks for a copy of your crisis plan. It outlines key steps...
Read post
[White Paper] Protect Your Business – 10 Steps to Early Incident Detection
Read post