Archive

Back to homepage
Software

Steps to Take to Beat the Insider Threat in 2018

Hackers get the headlines, but a data breach is more likely to originate inside your own office walls. Errors, negligence and malicious intent by employees are the leading causes of

IT Compliance

Five Last-Minute GDPR Compliance Tips

The European Union’s tough new data privacy law, the General Data Protection Regulation (GDPR), goes into effect on May 25, 2018. It’s no big secret; cybersecurity and compliance experts have

Hardware/Network

Is It Time to Unify Endpoint Management and Security?

Modern management makes sense and the industry is reacting. Will enterprise organizations jump on the bandwagon?Yesterday, VMware announced its intention to acquire E8 Security and integrate the technology into its

Identity Theft

The current state of USB data protection

Data protection, whether related to personal customer or patient information, is critical across virtually all industries. So how can organizations best protect their most sensitive and confidential information? To answer

Industry Insights

New security regulations are fine, but there is no substitute for innovation

“Everyone is part of our cyber security team,” said the chief information security officer at a private trust company in New York. “It doesn’t matter what myself or my colleagues

Mobile

Businesses suspect their mobile workers are being hacked

More than half (57%) of organisations suspect their mobile workers have been hacked or caused a mobile security issue in the last 12 months, according to the iPass Mobile Security

Software

Prevention Is Better Than Cure – Are You Cyber Secure?

A cyber attack can be as simple as an email that looks like it comes from your bank and includes an urgent link for you to click. When you take

Hardware/Network

‘Tapping’ the network for enhanced security

With digital transformation driving greater access services, productivity growth and enhanced public services, there is added pressure to protect against potential security breaches and optimize network uptime. What can governments

Industry Insights

How Measuring Security for Risk & ROI Can Empower CISOs

For the vast majority of business decisions, organizations seek metrics-driven proof. Why is cybersecurity the exception? Whoever coined the phrase “what you don’t know can’t hurt you” obviously never held

Industry Insights

Automating Ethics for Cybersecurity

Having a code of ethics and enforcing it are two different things.Doctors, accountants, and lawyers all operate under a code of ethics, but what about security professionals? Shouldn’t they, too?