Tag "IT Security"

Back to homepage
Industry Insights

An approach to cyber resiliency: unifying cyber security incident response and business continuity

Bringing cyber security incident response and business continuity teams together will enable organizations to better manage cyber resiliency suggests Chandrasekar S.  Cyber risks are nowadays considered as a business risk

Cloud

Top 10 Practices for Securing Cloud Workloads

Public cloud is one of the biggest challenges in every IT organization. While driving greater scalability, performance, and access for a competitive edge, it also introduces new security risks. More than just

Software

5 experimental cybersecurity trends your business needs to know about

These early-stage security trends have not yet seen widespread adoption, but may in the near future, according to CB Insights. Cybersecurity is becoming a major priority across all industries, as

Industry Insights

Understanding the Difference Between IT and Cyber Security

IT and cybersecurity are fundamental components of any company’s data security plans. Although used interchangeably, there are differences between how these terms are defined and what they involve.  IT (information

Expert Articles Hardware/Network

Edge Computing and Virtual Desktop Infrastructure (VDI): A Perfect Pairing

By Alan Conboy – Office of the CTO at Scale Computing, Virtual desktop infrastructure (VDI), a virtualization technology that creates fully personalized, individual desktop virtual machines with user profile control

Software

Cyber Security Today: Fake Office 365 site, don’t trust strangers and warning on college web site software

Fake Office 365 site, don’t trust strangers and warning on college web site software.. Click here to view original webpage at www.itworldcanada.com

Hardware/Network

6 Growth Hacking Tactics Every IT Security Company Must Exploit

There are plenty of lead generation strategies out there, but the most important part of all of this is creating a strategy that will take advantage of multiple channels of

Identity Theft

Are SMEs ready to finally combat cyber security breaches?

SMEs are spending little on cyber security as compared to the overall IT budget. Around 86 percent of SMEs have less than 10 percent of their total IT budget allocated

Hardware/Network

Over 80% of network teams play a role in security efforts

More than 4 in 5 IT teams are involved in security efforts, and a majority of them report an increase of at least 25 percent in time spent on these

Software

The importance of IT asset management within digital transformation processes

In this Help Net Security podcast, Marco Rottigni, Chief Technical Security Officer for Qualys across EMEA, talks about the importance of IT asset management within digital transformation processes. He illustrates why it’s