Tag "Data Security"

Back to homepage
Cloud

Monitoring multi-cloud environments

In today’s fast-growth, faster-results market, customers expect applications to be consistently available and up-to-date — which is often easier said than done. Meeting that demand often involves migrating to the

Industry Insights

What We Can Learn From This Year’s National Cybersecurity Awareness Month

National Cybersecurity Awareness Month (NSCAM) has been an annual fixture since October 2003. The goal of the last 16 years has been to raise awareness of the importance of security

IT Compliance

Inadequate Data Sanitization Puts Enterprises at Risk of Breaches & Compliance Failures

Global enterprises’ overconfidence and inadequate data sanitization are exposing organizations to the risk of data breach, at a time when proper data management should be at the forefront of everything they

Industry Insights

How British Red Cross’s IT security chief is demystifying cyber for staff

Lee Cramp is the head of information security at the British Red Cross, but unlike many other roles like his, he does not have an IT security team that sits

Hardware/Network

California IoT security law: What it means and why it matters

In September, California Governor Jerry Brown signed into law a new bill aimed at regulating the security of IoT devices, and it’s set to go into effect in a few short months

Software

Taking Stock of Your Data Security to Deliver a Happy Holiday Shopping Season

With the holidays approaching, many of us are thinking about taking time off from work to be with friends and family, as well all the last minute shopping that needs

Software

Want to build a successful SOC? Here’s what you need to know

There is no arguing the fact that networks are continually growing in complexity and the cyberattack surface is constantly expanding. A critical step in building a stronger security posture and more robust

Mobile

The way Bluetooth devices ‘talk’ to apps leaves them vulnerable

Mobile apps that work with Bluetooth devices have an inherent design flaw that makes them vulnerable to hacking, a research has found. Click here to view original webpage at www.helpnetsecurity.com

Software

Changing Facade of Cybersecurity: Top Threat Trends for MSPs to Watch

One of the best approaches for combatting evolving threat trends is deploying predictive protection and investing in ongoing cybersecurity training. As the threat landscape gets murkier, it is imperative that

Software

Trusted certificates make phishing websites appear valid

There has been a rampant growth of look-alike domains, which are often used to steal sensitive data from online shoppers. Venafi analyzed suspicious domains targeting 20 major retailers in the