To protect from liability concerns, enterprises need something in writing so that everyone knows what to do upon finding an insider threat. Here are some suggestions from security experts. Read More ▶ |
|
| White Paper: Dell Inc This study provides insight on various types of clouds and how they are used today along with a practical framework to evaluate converged infrastructure versus do-it-yourself approaches. Based on interviews with organizations that implemented VCE solutions, Forrester quantified how VCE converged infrastructure drove significant increases in IT efficiency and productivity, as well as decreases in the cost associated with infrastructure. Read More ▶ | Following a breach, organizations should focus on mitigating damage and data loss and providing information to law enforcement. Partner at Ballard Spahr, LLP and former Assistant U.S. Attorney Ed McAndrew and Guidance Software President and CEO Patrick Dennis have compiled best practices for preparing and responding to a cyber-attack and working with law enforcement. Read More ▶ |
| Virtual CISOs can be an invaluable resource for companies with limited resources. But are they a short-term fix to a long-term problem? Read More ▶ |
| | The average cost per record is $158 whereas the cost per record breached ranges from $355 to $129 for healthcare and retail industry respectively. Despite the high risk of the threat, enterprises continue to fall victim to data breaches globally and it raises a significant concern over protecting the data organizations own, process and store. Read More ▶ |
| Catching an insider taking confidential information doesn't happen by chance, and policies and procedures must be in place to know what to do when an insider is caught. Read More ▶ |
| Homeowners worried about cybersecurity attacks on IP-connected devices like lights, baby monitors, home security systems and cameras, will soon be able to take advantage of a $200 network monitoring device called Dojo. Read More ▶ |
| According to F-Secure’s The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of attack scripts and plenty of poorly secured networks. Read More ▶ |
| White Paper: Google From wearable devices to virtual personal assistants, Gartner highlights new technology trends that will disrupt the workplace as we know it. Find out how forward-thinking IT leaders can take advantage of today's most powerful tools, such as cloud-based services, interconnected devices and adaptive security architectures. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|