Upcoming Vendor Webcast
Social has changed many aspects of information security. Fascinatingly, enterprise has been slow to embrace community sourcing security intelligence.
How serious is the risk of visual hacking in your organization? Consider who may be viewing, photographing and collecting sensitive information from your offices and electronic devices when staff is mobile.
According to Accenture's 2015 Global Risk Management Study, financial services and banking executives view cyber & IT risk as their top risk area over the next two years.
Digital Identity is the foundation for granting user access in today's connected enterprise. Dated authentication approaches fall short on both security effectiveness and user experience.
In the modern enterprise privileged users are no longer entirely inside the perimeter, nor is your infrastructure.
The cloud movement presents a rare and momentous opportunity to revisit not only how we think about computing, but also how we think about information security.
PREVIOUS VENDOR WEBCASTS
Companies today are faced with the monumental challenge of establishing strong and persistent file protection to ensure sensitive corporate information remains protected. Until now, companies have relied on traditional security solutions to protect critical information.
External threat actors are using innovation and automation to stay ahead of traditional security defenses.
Sometimes the most obvious problems go unnoticed because they're hidden in familiar places.
Distil Networks has produced their annual Bad Bot Report. It's the IT Security Industry's most in-depth analysis on the sources, types, and sophistication levels of last year's bot attacks-- and there are serious implications for anyone responsible for securing their web infrastructure.
Today's threats are becoming increasingly complex. Organizations can no longer rely on antivirus alone and must be on the lookout for innovative, next-generation endpoint protection solutions.
The growing increase in adoption of Cloud and SaaS services, is taking place with the most intense threat landscape we've seen in generations.
You see it every day in the media, blog posts and industry marketing; "It isn't a question of if, but when." This defeatist attitude is settling over the industry like Death's own shawl.
Attackers are more sophisticated than they've ever been. They're targeting our intellectual property, sensitive customer information, user information and much more. The network is not the target—it's the endpoint where that data resides.
The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.
There is no question about the acceleration of data migrating to the cloud. But which cloud? All clouds: a mix of Infrastructure-, Platform- and Software-as-a-Service cloud models are being deployed by almost every organization.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- Scammers target oil companies with sneaky attack
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Study: Employees acknowledge risky security behavior, continue to engage in it
- Hack of airplane systems described in FBI docs raises security questions
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Thousands of Bellevue Hospital Center patients notified of data breach
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- Investigation ongoing in reported multimillion member Adult FriendFinder breach
- Report: $19M breach settlement between MasterCard, Target terminated
- FTC gives thumbs up to companies that cooperate during breach probes