Latest Resources

IT Security Ebooks

2014 audit and compliance ebook

2014 audit and compliance ebook

We explore the landscape today with which security teams must contend and compile a number of best practices and strategies you can apply to protect your company.

PCI 2014: From compliance to security

PCI 2014: From compliance to security

The consensus from our panel of experts is that PCI DSS should be just one item on a far broader effort to integrate data security into enterprise risk management.

Road Warrior Spotlight

For access to the internet and corporate networks, today's most efficient road warriors equip themselves with a range of devices, accessories and services - everything from laptops, tablets and smartphones to 3G modems, as well as video and conferencing apps using VoIP, like Google Voice, FaceTime and Skype. But, while mobile connections can be convenient for workers on the go, the security of the transmissions is still a primary concern for those charged with protecting corporate assets. And, individuals emailing and transferring documents from a café, hotel room or any Wi-Fi-enabled hotspot outside of their protected VPN, is potentially putting their own personal data at risk. 

What can road warriors do to better protect their employer's data (as well as their own personal information)? For this latest Spotlight we spoke with a number of industry experts to gain their first-hand knowledge of best practices, tools and strategies that, if implemented, could greatly improve the security of digital transmissions - be it via email, dropping files onto a shared cloud server, mobile phone call or videoconference.

Download the PDF now!

Slideshows

September 2014 Global Threats

September 2014 Global Threats

A Chinese security firm showed the world how it hacked the Tesla S Car. Also in this month's threats, Iran ...

Weekend news review: September 22-26

Weekend news review: September 22-26

A vulnerability bigger than Heartbleed was disclosed this week, and Apple continued to battle its new iOS 8 issues with ...

Weekend news review: September 15-19

Weekend news review: September 15-19

Along with the release of two-factor authentication for iCloud, Apple had one of its uncommon "Update Surprisedays." Researchers discovered a ...

Weekend news review: September 8-12

Weekend news review: September 8-12

This week's news looked at a couple studies, one of which showed that the 6-year-old worm Conficker is still making ...

Case Studies

Forward progress: How the Denver Broncos really play defense

Forward progress: How the Denver Broncos really play defense

Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.

Case study: Big LAN on campus

Case study: Big LAN on campus

A university rolled out a wireless network, but was hampered with a user-support problem...until a solution was found. Greg Masters reports.

Case study: Mine games

Case study: Mine games

A website attack prompted an Australia-based mining company to shore up its security implementation, reports Greg Masters.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US