Debate: Security training is effective in preventing workers from clicking on malicious links and attachments.
In this month’s debate, two experts discuss whether security training is an effective strategy in the workplace.
In this month’s debate, two experts discuss whether security training is an effective strategy in the workplace.
Managing privacy is moving toward collaboration, communication and education, says Ernst & Young’s Sagi Leizerov.
An upcoming update of a credit card standard offers an opportunity to assess overall security, says Symcor’s Della Shea. James Hale reports.
Threats from inside an organization – and from third-parties – pose a burgeoning challenge for security professionals, reports Jim Romeo.
Services abound for business continuity and disaster recovery in the cloud, but what’s the right choice for your firm? Alan Earls investigates.
Federal agencies tasked with Americans’ safety can find other ways to fulfill their duties without stomping all over the U.S. Constitution and Bill of Rights.
Organizations today have a master data model to drive efficiencies in system design. How about a similar approach for the enterprise security program?
Malware is increasingly being created for tablets and smartphones, and that is our threat of the month.
The endpoint has taken on both new importance and new dimensions in the overall information protection scheme.
This month’s company news includes the departures of Graham Cluley and Carole Theriault from Sophos, the acquisition of Aveksa by EMC, and more.