Although the terms "backup" and "archiving" are sometimes used
interchangeably, they refer to two completely different processes. Both deal
with long-term data storage, yes, but that is where the similarities end.
Backups are designed to provide an organization with a way of recovering its
data following some sort...
A national cybersecurity strategy document released by the White House last week - along with comments from a top Trump administration official that the U.S. would step up its offensive cyber measures - are getting mixed reviews from cybersecurity experts.
Security is a journey not a destination. What's been deployed today may be found
to have a vulnerability tomorrow. Operating systems like Windows Server 2003 and
2008, which were once trusted building blocks for critical applications, are now
potential liabilities as time goes on and maintenance comes to an end and...
Those of you who are CISOs and have been conducting awareness programs for years realize that ''the devil is in the details" when building a successful program. Initial attempts to get an awareness program started are usually done by trial and error- but this hit-and-miss approach is often ineffective or frustrating....
The biggest security budget in the business cannot save you from also suffering one of the biggest breaches. The key is: Do you have the right skills and technology deployed to defend your critical assets? Michael Malone and Ben Johnson of Datashield, an ADT company, make the case for outsourcing.
Criminals operating online continue to target cryptocurrencies, leverage phishing and other social engineering attacks, as well as tweak age-old scams - including Nigerian prince emails - for the modern age. So warns Europol in its latest Internet Organized Crime Threat Assessment.
If you're going to hack, why not go for the gold? That appears to have been the impetus behind an unusual data breach at the government-owned Perth Mint in Western Australia, which says personal details for 3,200 customers stored in an old database were compromised.
From the sudden spread of WannaCry and Petya/NotPetya,
to the swift growth in coinminers, 2017 provided us with
another reminder that digital security threats can come
from new and unexpected sources. With each passing year,
not only has the sheer volume of threats increased, but the
threat landscape has become...
The threat landscape continues to evolve and cyber-attacks are more sophisticated than ever. Therefore, your endpoint protection needs to evolve too. Check out the latest Gartner report for leading industry insight in redefining Endpoint Protection Platforms. Also learn why Symantec continues to be
Email security in the era of the cloud is a critical concern for business leaders. This tool is a powerful way for businesses and services to communicate with their customers. From transaction notifications to billing statements to social media updates, email is a proven reliable and effective way for businesses to...