Latest Resources

IT Security Ebooks

2014 audit and compliance ebook

2014 audit and compliance ebook

We explore the landscape today with which security teams must contend and compile a number of best practices and strategies you can apply to protect your company.

PCI 2014: From compliance to security

PCI 2014: From compliance to security

The consensus from our panel of experts is that PCI DSS should be just one item on a far broader effort to integrate data security into enterprise risk management.

Road Warrior Spotlight

For access to the internet and corporate networks, today's most efficient road warriors equip themselves with a range of devices, accessories and services - everything from laptops, tablets and smartphones to 3G modems, as well as video and conferencing apps using VoIP, like Google Voice, FaceTime and Skype. But, while mobile connections can be convenient for workers on the go, the security of the transmissions is still a primary concern for those charged with protecting corporate assets. And, individuals emailing and transferring documents from a café, hotel room or any Wi-Fi-enabled hotspot outside of their protected VPN, is potentially putting their own personal data at risk. 

What can road warriors do to better protect their employer's data (as well as their own personal information)? For this latest Spotlight we spoke with a number of industry experts to gain their first-hand knowledge of best practices, tools and strategies that, if implemented, could greatly improve the security of digital transmissions - be it via email, dropping files onto a shared cloud server, mobile phone call or videoconference.

Download the PDF now!

Slideshows

Weekend news review: September 8-12

Weekend news review: September 8-12

This week's news looked at a couple studies, one of which showed that the 6-year-old worm Conficker is still making ...

Weekend news review: September 1-5

Weekend news review: September 1-5

A celebrity nude photo scandal dominated the news this week. Apple denies that a vulnerability in its iCloud system let ...

September 2014 Threat Stats

September 2014 Threat Stats

More than 800 million personal records have been involved in U.S. breaches since January 2005, according to new research from ...

Weekend news review: August 25-29

Weekend news review: August 25-29

A DDoS attack targeting the PlayStation Network downed the service for most of this past Sunday, and a zero-day vulnerability ...

Case Studies

Forward progress: How the Denver Broncos really play defense

Forward progress: How the Denver Broncos really play defense

Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.

Case study: Big LAN on campus

Case study: Big LAN on campus

A university rolled out a wireless network, but was hampered with a user-support problem...until a solution was found. Greg Masters reports.

Case study: Mine games

Case study: Mine games

A website attack prompted an Australia-based mining company to shore up its security implementation, reports Greg Masters.

Sign up to our newsletters

POLL