Security leaders know their old perimeter-based security models are insufficient. But what new model is best? And how can it reduce reliance on passwords for authentication? Julian Lovelock of HID Global offers insight.
Distributed-denial-of-service attacks are not new, but they are being taken more seriously as a threat to network security and data protection, especially by financial-services, says Ashley Stephenson of Corero Network Security.
The idea that smartphone apps can "put your business in the world's pocket" is driving the financial industry to rush to mobile applications. As a result, business elements that used to be physically secure are now being exposed to the general public. Couple that with a relatively young, chaotic mobile ecosystem, and...
A new study says, on average, it takes 87 days to first recognize that insider fraud has occurred. Why the delay? Researcher Larry Ponemon and Christine Meyers of Attachmate Luminet discuss the findings.
The big, external breaches get the headlines, but the insider crimes are doing significant financial damage, says Tim Ryan of Kroll Advisory Solutions. How can organizations address the insider threat?
Paige Leidig, chief marketing officer of CipherCloud, says information protection requirements continue to be the primary hurdle for enterprise adoption, despite explosive growth in the cloud content and collaboration market and its evident advantages to productivity and cost efficiencies.