OPINIONS

The best defense is a good offense: The importance of securing your endpoints

The best defense is a good offense: The importance of securing your endpoints

The saying "better safe than sorry" rings true when it comes to data security.

Shadow data: The monster that isn't just under your bed

Shadow data: The monster that isn't just under your bed

As end users bring their own devices, applications, and even networks into their employer's fray, hallowed IT security concepts like visibility, control and peace of mind are jettisoned out the window.

The power of the subconscious to protect against online fraud

The power of the subconscious to protect against online fraud

Cybercriminals often are specifically looking for credit card numbers that can be reused on other e-commerce sites or sold to the highest bidder on the digital black market.

The car alarm syndrome and the high cost of too many security alerts

The car alarm syndrome and the high cost of too many security alerts

Sophisticated bad guys are likely to assume that high-value targets have deployed the latest security technologies - this has been the case going back over a decade.

Why it's time to replace the tootsie pop approach to network security

Why it's time to replace the tootsie pop approach to network security

How did we arrive at this approach to network security and, more importantly, what's happening today that's causing us to seriously rethink this approach?

The one-two punch of cybercrime: Who's leading the fight?

The one-two punch of cybercrime: Who's leading the fight?

Whose responsibility is it to lead the fight against cybercrime and protect valuable health care data? The answer: it's not just one person.

Why enterprise IT and security teams should talk more

Why enterprise IT and security teams should talk more

The "It won't happen to me" mentality combined with communication gaps between the IT and security teams greatly increases enterprises' risk of being breached.

Developer liability, data proliferation at center of FTC report on IoT

Developer liability, data proliferation at center of FTC report on IoT

The truth is simply that none of us, including the FTC and Ofcom, fully know or understand the extent for which the unintended consequences of IoT will show its ugly head.

This key unlocks the door to a network virtualization wonderland

This key unlocks the door to a network virtualization wonderland

One crucial step will ensure that you do not fall haphazardly down the rabbit hole on your way there.

What we can learn from $1 billion bank-robbing malware

What we can learn from $1 billion bank-robbing malware

If we can learn anything from the Carbanak malware, it is to use stealthy and evasive maneuvers in the security technology and education we deploy within enterprises to fight fire with fire.

Sign up to our newsletters

TOP COMMENTS