The workplace is transforming, and keeping up with evolving security
threats has become more critical and challenging than ever. Malware
attacks come from all directions and according to IDC, 70 percent of
successful breaches begin at the endpoint.1 This means that having a
comprehensive endpoint management...
Exploits are commonly used in cyber attacks: upwards of 90% of reported data breaches involve an exploit at one or more points in the attack chain. Including exploit prevention as part of a comprehensive lineup of security defenses is clearly valuable.
Almost every major security vendor can claim some level of...
Businesses MUST address the proliferation of mobile devices in the workplace, whether authorized or not. For every laptop, there is a mobile phone, literally doubling the attack surface for hackers to breach your business and cause harm to you and/or your customers. While protection for traditional devices has long...
Facebook revealed Friday that it had discovered a breach that affected almost 50 million user accounts. Attackers exploited a vulnerability that enabled them to steal "access tokens," digital keys that keep users logged in so they don't need to re-enter their password.
Several days after the Port of San Diego was hit by a crypto-locking ransomware attack, incident response efforts remain underway and many port systems remain offline. Port officials say the attacker has demanded a ransom, payable in bitcoin, for the promise of a decryption key.
Because business associates have been culprits in heath data breaches impacting millions of individuals, healthcare entities need to be diligent in taking steps to reduce the persistent risks these vendors pose, says privacy and security expert Susan Lucci.
In harmony with a wave of global privacy and security legislation, Canada has its own new breach notification requirements going into effect on Nov. 1. Attorney Ruth Promislow says these standards will force organizations to shift from a reactive to a proactive approach to incident response.
Ryan Duquette, an independent forensics examiner who formerly was a criminal investigator in law enforcement, offers insights on public/private partnerships and how investigators can work better with enterprises in the event of a breach.
Most enterprises are at least discussing security
analytics. But how are they actually deploying these
tools? And with what levels of automation and
Download this e-book to learn more about:
How security analytics is commonly used today;
The potential of automation;
How orchestration impacts...
It may seem silly to wonder how safe your backups are; backups are rarely
thought of as being at risk. It stems back to a time when backups were on
tape - a medium that would be tough for even skilled developers to hack. But
today's backups are stored (whether on-premises or in the cloud) on disk or,
If you are reading this, it means you are taking time out of your busy schedule to search for data protection solutions. Data protection is not meant to be exciting; it's meant to automate the boring parts through automation so that your company stays out of the negative headlines.
"You get paid for...
Modern backup is still too complicated. Adding to the woes of the modern backup administrator
is the fact that very few organizations get to tear
their entire IT apparatus down and take a completely
modern, greenfield approach. In the real world, data
centers are the result of incremental growth. With that growth...
Although the terms "backup" and "archiving" are sometimes used
interchangeably, they refer to two completely different processes. Both deal
with long-term data storage, yes, but that is where the similarities end.
Backups are designed to provide an organization with a way of recovering its
data following some sort...
A national cybersecurity strategy document released by the White House last week - along with comments from a top Trump administration official that the U.S. would step up its offensive cyber measures - are getting mixed reviews from cybersecurity experts.