Latest Resources

IT Security Ebooks

2015 threat intelligence ebook

2015 threat intelligence ebook

While threat intelligence didn't stop attackers of the health care giant Anthem, the breach is likely to add to the pressure to improve efforts to make threat data intelligible and useful to frontline IT security specialists.

2015 DDoS ebook

2015 DDoS ebook

They are brutal, in-your-face power invasions designed to overwhelm servers and bring networked systems down without any nuance or surreptitiousness. This latest ebook explores the newest iterations of this scourge and how best to defend against them.

Road Warrior Spotlight

For access to the internet and corporate networks, today's most efficient road warriors equip themselves with a range of devices, accessories and services - everything from laptops, tablets and smartphones to 3G modems, as well as video and conferencing apps using VoIP, like Google Voice, FaceTime and Skype. But, while mobile connections can be convenient for workers on the go, the security of the transmissions is still a primary concern for those charged with protecting corporate assets. And, individuals emailing and transferring documents from a café, hotel room or any Wi-Fi-enabled hotspot outside of their protected VPN, is potentially putting their own personal data at risk. 

What can road warriors do to better protect their employer's data (as well as their own personal information)? For this latest Spotlight we spoke with a number of industry experts to gain their first-hand knowledge of best practices, tools and strategies that, if implemented, could greatly improve the security of digital transmissions - be it via email, dropping files onto a shared cloud server, mobile phone call or videoconference.

Download the PDF now!

Slideshows

Weekend news review: February 23-27

Weekend news review: February 23-27

Anthem clarified the exact number of people affected by the company's data breach in each state, and a vulnerable Google ...

February 2015 Threat Stats

February 2015 Threat Stats

The U.S. accounted for more than 70 percent of attack volume in November 2014. Also this month, U.S. hackers most ...

Weekend news review: February 17-20

Weekend news review: February 17-20

Kaspersky Lab had plenty to share this week regarding espionage campaigns, the co-creator of the infamous BlackShades RAT plead guilty, ...

February 2015 Global Threats

February 2015 Global Threats

This past month, Anonymous took credit for attacks on Mexican government and academic websites, and an Iranian group is suspected ...

Case Studies

Making the grade: CIPA compliance

Making the grade: CIPA compliance

A Chicago-area high school found a solution to broaden its internet pipeline and maintain compliance, reports Greg Masters.

On air: Social media safeguard

On air: Social media safeguard

To avoid damage from staff using social media, a radio network made certain its cloud was defended. Greg Masters reports.

Network care: Case study

Network care: Case study

When a care provider supplied laptops to its roving employees, it added a security solution to enable efficient collaboration. Greg Masters reports.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US