4 Easy Steps How to Conduct IT Security Audit of Your Own Company
Businesses often view data security audit as a stressful and intrusive process. Auditor walks around distracting everybody and meddling in…
Law Firms: You Need Enterprise Level Cyber Security
Long ago, it was up to the IT department to protect a company’s data from cyber thieves and internal security…
Is Big Data Security Still Lacking?
While the idea of keeping big data secure is not new, have the companies which provide these services been keeping…
6 Tips to Protect Your Business’ Most Important Asset: Your Data
Cybersecurity is a top concern for small businesses and everyday digital users. With governments and organizations now placing a greater…
Where the Fog Meets the Edge
It’s become increasingly difficult to ignore the importance of cybersecurity. From the role it played in the 2016 presidential election to the…
Cloudflare admits bug leaked customer data for months
Dive Brief: Cloudflare announced Thursday that its edge servers leaked sensitive data — including customer passwords, cookies and authentication tokens — for…
DHS wants to stop the rise of large-scale DDoS attacks
Dive Brief: The Department of Homeland Security is funding new research to stop distributed denial of service (DDoS) attacks, according…
Practical Ways to Protect Customer Information
We’re at an interesting point in history. The global cyber security market is expected to be worth as much as…
After years in hiding, SQL Slammer worm returns with a vengeance
Dive Brief:SQL Slammer, a computer worm that first appeared in January 2003, is back, according to Check Point, which detected…
Data Security: Ransomware-as-a-Service and What To Do To Avoid It
Ransomware-as-a-Service (RaaS) doesn't sound like something you'd want to include in your technology toolset, does it?