Latest Resources

IT Security Ebooks

APTs: New, improved and smarter than ever

APTs: New, improved and smarter than ever

While a return to a pre-APT Eden may be both unlikely and perhaps impossible, as this new ebook finds there are things that organizations and the industry as a whole can do to rebuild a more generally trustworthy environment.

2015 insider threat ebook

2015 insider threat ebook

The consensus of the experts we spoke with is that the continual deluge of high-profile cyber attacks during the past year reinforces the need for organizations to be cognizant of risks under their roofs.

Road Warrior Spotlight

For access to the internet and corporate networks, today's most efficient road warriors equip themselves with a range of devices, accessories and services - everything from laptops, tablets and smartphones to 3G modems, as well as video and conferencing apps using VoIP, like Google Voice, FaceTime and Skype. But, while mobile connections can be convenient for workers on the go, the security of the transmissions is still a primary concern for those charged with protecting corporate assets. And, individuals emailing and transferring documents from a café, hotel room or any Wi-Fi-enabled hotspot outside of their protected VPN, is potentially putting their own personal data at risk. 

What can road warriors do to better protect their employer's data (as well as their own personal information)? For this latest Spotlight we spoke with a number of industry experts to gain their first-hand knowledge of best practices, tools and strategies that, if implemented, could greatly improve the security of digital transmissions - be it via email, dropping files onto a shared cloud server, mobile phone call or videoconference.

Download the PDF now!

Slideshows

Weekend news review: April 13- April 17

Weekend news review: April 13- April 17

Multiple studies were released this week including one that pointed out the banking industry's lacking security protocol for third-party vendors. ...

Weekend news review: April 6- April 10

Weekend news review: April 6- April 10

NIST released a draft for final comments earlier this week with a deadline of mid-May. Later in the week, researchers ...

April 2015 Global Threats

April 2015 Global Threats

For the period reported, the EMEA region (Europe, Middle East, Africa) was the leading source of all zombie IP addresses. ...

Weekend news review: March 30- April 3

Weekend news review: March 30- April 3

This week President Obama beefed up the United States' possible cyber attack recourse, and IBM invested $3 billion in a ...

Case Studies

Case study: Fit for a queen

Case study: Fit for a queen

Queens College found a solution to monitor activity and manage devices on its network, reports Greg Masters.

Making the grade: CIPA compliance

Making the grade: CIPA compliance

A Chicago-area high school found a solution to broaden its internet pipeline and maintain compliance, reports Greg Masters.

On air: Social media safeguard

On air: Social media safeguard

To avoid damage from staff using social media, a radio network made certain its cloud was defended. Greg Masters reports.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US