Advertise

Advertise

Three quick tips for preventing ransomware

The most effective strategy for stopping ransomware attacks relies on preventing them from entering your organization. As the number of applications and services used by businesses continue to increase, the result can be an increase in attack surface. Organizations must consider how to secure these new services across the network, SaaS-based applications and endpoints from the start.…

Improving network operational efficiency

When determining the operational costs of running an enterprise network, the noted research firm Gartner says that 80 percent of the total IT costs occur after the initial purchase. The significance of recurring operational costs is not always realized by organizations that are mainly focused on short-term investments. Correct configuration is fundamental for network security.…

Don’t dump your perimeter security

While perimeter security has certainly changed over the years, it would be negligent to suggest that companies not protect the edge of their network as best as they can. Want proof? Published reports of a recent hack at an Asian bank netted the criminals more than $80 million due to an underpowered router that was…

It’s 2 a.m. Do you Know Where Your Data is?

An essential part of protecting your data is knowing where it is all the time. Changes in privacy laws around the globe impact how you and your service providers manage your data. Stephen Lawton reports.

Identifying data security vulnerabilities

Data security hygiene does not just mean protecting your network from highly sophisticated attacks. It means making sure all the basics are covered. Could your network pass a Data Security 101 test?  Stephen Lawton reports. This editorial product was produced by the SC editorial team and underwritten by Informatica. It is part two of a four-part…

Supporting BYOD without reservation

 When Spiceworks asked survey participants who restricted BYOD access why they did so,  the top answer by a substantial margin was concern about security, followed by concern about keeping personal and corporate data separate. This is consistent with other reports about BYOD concerns over the last several years.   When asked about the greatest challenge…

Data security in the 21st century: Essentials of solid protection

Getting to the bare-bones of data protection This editorial product was produced by the SC editorial team and underwritten by Informatica.It is part three of a three-part series. When considering data security needs in the 21st century and beyond, bare-bones basics are still required, along with a few nimble inventive moves on the parts of…

Data security in the 21st century

Investment in data protection proves cost-effective. Convincing the board is another matter. Stephen Lawton reports. This editorial product was produced by the SC editorial team and underwritten by Informatica. It is part one of a three-part series. Building a return-on-investment (ROI) argument can be difficult enough when dealing with known information security technology, but creating an…

The state of SIEM

The state of SIEM

The technology is capable of providing all of the data organizations need for compliance, but managing the log activity to make sense of it can be a challenge.

Next post in Advertise