Sign up | Login with →

Security

How to Ensure Protection of Critical Business Data

May 26, 2015 by Peter Davidson

Hackers and digital scam artists who make a living out of stealing sensitive business related information from corporate computers have been in existence for as long as the internet has existed. Trade secrets and classified e-mail threads are often published online and sold to the highest bidder by these hackers, which can cause incalculable damage to the reputation and wellbeing of the company in question.[read more]

Employee Training and Other Ways to Protect Your Company’s Valuable Data

May 15, 2015 by Rick Delgado

Employee training.

In the last decade, companies have seen new business opportunities thanks to the advancement in technology. However, these technologies can also pose extreme threats to valuable data of businesses that not only breach their confidentiality and trade secrets, but cause them to lose millions. Along with technology, employees pose equal cyber security threats of company data.[read more]

exclusive

Secure Video Conferencing

May 13, 2015 by Richard Smith

With so many video conferencing options available, it can be difficult to decide on the right solution for your enterprise. According to a recently published study by the Wainhouse Research Group, enterprises are struggling to keep up with an increasingly changing workplace. The study shows that by 2020, Millenials will make up at least half of the global workforce, and with that demographic change will come differences in procedures, tools, and working preferences.[read more]

exclusive

5 Questions to Ask as You Prepare for a Compliance Audit

May 12, 2015 by Brad Thies

For most cloud service providers, a compliance audit is, at best, a necessary evil — the root canal of the business world. Like a root canal, it can be a painful process that you regret about halfway through, even if you know it’s good for you. But just as you can avoid root canals with proper dental hygiene and regular checkups, the pain of compliance audits can be avoided with proper preparation.[read more]

exclusive

Why Returning $1 Trillion to Shareholders is a Bad Idea

May 4, 2015 by Paul Barsch

Risky Business column.

With creaking IT infrastructures and under-investment in other areas such as plants, equipment, employee training and more, excessive share buybacks aren't just a flawed strategy; they are a dangerous one for the future health of companies across the globe.[read more]

IBM Opens Up Its Threat Data as Part of New Security Intelligence Sharing Platform

April 18, 2015 by Sarah Smith

IBM.

IBM has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other network defenders. On Thursday, the company opened up over 700 terabytes of data about vulnerabilities, attacks and other threats through a new cloud-based threat intelligence sharing platform called IBM X-Force Exchange. Other organizations can use the platform to share or confirm their own data, so they can more efficiently respond to security incidents.[read more]

exclusive

Malicious Tool Provides Attackers with a New Type of Zombies

April 15, 2015 by Sophie Davidson

Cyber criminals.

An interesting concept which has really emerged only lately - IoT, or: “the Internet of Things”, has recently been in the scope of cyber criminals and internet security specialists. The IoT is a vision, rather than an actual network. It's the notion that with increasingly more devices empowered by communication facilities, those devices inevitably end up as entities in a network scheme.[read more]

exclusive

How to Clean Up the Mess: Surviving a Data Breach

April 14, 2015 by Neill Feather

Data breach.

Here’s a scary thought: Nearly half (43%) of all companies experienced a data breach last year, most of which took weeks to discover. For many businesses, these data breaches were catastrophic to the point of bankruptcy (the average cost of a single compromised record being more than $194).[read more]

Facebook’s ThreatExchange to Help Cyber Security Experts Coordinate Their Efforts Against Hackers

April 9, 2015 by Sarah Smith

Cyber security.

These days, cyber attacks are the biggest threat to companies and governments around the world. Even President Obama recently laid out a comprehensive plan to tackle cyber security issues. It remains to be seen what results Facebook's ThreatExchange can produce. Still, any platform that brings cyber security experts together and encourages them to share data is a positive development. Hackers are only going to step up their efforts, and security experts need to respond with a concerted effort.[read more]

exclusive

A Look at How Keyless SSL Works

March 28, 2015 by Anand Srinivasan

Secure socket layer.

Secure Socket Layer, or SSL for short, is one of the key elements to providing a safe and secure web transaction. Websites that offer financial services or handle confidential user information have for long used SSL technology to encrypt such sensitive data and thus deter hackers from stealing them.[read more]

Protecting Your Data Wherever It Goes [INFOGRAPHIC]

March 5, 2015 by Zach Taiji

Your data.

In today’s world, the top four places your data is at risk is the cloud, email, third parties and mobile devices according to a new study by information security company Seclore.[read more]

exclusive

From Police to Partner: The Changing Role of IT

December 12, 2014 by Tom Smith

IT security / shutterstock

IT professionals must adopt a new role that strikes a balance between employee needs and preferences and security. Here are four things you need to effectively become a partner rather than a policeman, while maintaining a secure company infrastructure.[read more]

exclusive

Scary Security Concerns With the Internet of Things

December 5, 2014 by Rick Delgado

IoT.

Internet security is already a multibillion dollar industry, and having to add new features in order to grant greater protection for the new IoT promises to make this industry ever more expansive. However, this means that the burden of promising to provide the utmost in security is even greater than before.[read more]

Dynamic Cybersecurity Needs: Reassessing Security

November 30, 2014 by Thu Pham

cybersecurity needs

As a recent report on Defending Data by Nuix found, cybersecurity needs are dynamic - 73 percent of surveyed participants report that their organization’s cybersecurity needs have changed in the past year. Another 69 percent expect their needs to change again within another year.[read more]

Big Data Ethics and Your Privacy [INFOGRAPHIC]

November 29, 2014 by Mark van Rijmenam

Internet saturated nations

Unlike a few years ago, a lot more people understand that services like Google, Facebook or Twitter are not free of charge, but are paid for with our data. How do we feel about that? How do we feel about privacy and security? And what are some of the common Internet values related to privacy?[read more]