Data Privacy Laws: Cutting the Red Tape
National governments are enacting new, stringent data privacy laws to protect citizen data, guard national security interests, and potentially provide a boost to local industries. This rush to protect sensitive and personally identifiable!-->…
Create more secure software code: 5 key steps
Software security, or rather the lack thereof, has become commonplace and an all-too-frequently recurring story in media around the world. Ultimately, all software security failures can be traced back to unsound application code or!-->…
Internet security Staying safe online
This information guide has been prepared by Age UK and contains general advice only. It should not be relied on as a basis for any decision or action and cannot be used as a substitute for professional medical advice. Neither Age UK nor!-->…
The Definitive Guide to Cyber Threat Intelligence
Technology alone cannot stop todays advanced cyberattacks. Learn how to heighten your defenses with our FREE eBook. The Definitive Guide to Cyber Threat Intelligence, courtesy of iSIGHT Partners. Request your copy below for an inside look!-->…
Information Governance: Fighting Back Against the Exponential Data Curve
You know the facts. Information is exploding at a rate greater than 40% year-over-year. This is not news. The term information explosion has been around since the 1960’s and for the past 50 years, organizations have been focused on!-->…
Take It to the Board
People play a major role in securing data. As part of a well-planned budget, employee education is a preventive measure that can save enterprises much more than the initial cost of investment by helping to protect stored information,!-->…
Putting the Secure in Secure Remote Access
Learn how Citrix NetScaler with Unified Gateway delivers a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.
Six costly data protection gaps in Microsoft Office 365 and how to close them
MICROSOFT OFFICE 365 IS A DATA LOSS DISASTER WAITING TO HAPPEN. If your business relies on Microsoft Office 365, you can expect reliable access to its applications with very high uptime. But many IT professionals are laboring under a!-->…
Manage Identities Across the Hybrid Cloud
By consolidating identity management across all internal and external systems with Oracle Identity Cloud Service, our customers can easily and securely access a wide range of services with a single ID. Implementation was quick and easy,!-->…
Accelerate Incident Response with Threat Intelligence
How Threat Intelligence improves Incident Response It’s a tough world out there. Even as nation-state actors have developed powerful new capabilities, criminal groups have developed capabilities formerly limited to nation-states. Through!-->…
Medical Devices and Cybersecurity
The integration of advanced information technologies in medical devices has transformed the healthcare industry, resulting in dramatic improvements in the efficiency and effectiveness of healthcare and related services. But this!-->…
The Evolution of Business Ransomware Attacks
Ransomware can have a negative – even crippling – impact on businesses. This type of attack is becoming increasingly common and is constantly evolving into new, more advanced strains. Many companies are unaware of the threat it poses;!-->…
Ontario Energy Board Cyber Security Framework Compliance
The Ontario Energy Board recently published a report entitled “Cybersecurity Framework to ProtectAccess to Electronic Operating Devices and Business Information Systems within Ontario’s Non-BulkPower Assets.” As Ontario’s independent!-->…
Together, Cequence and Vercara will fight cyber threats and transform API security.
The innovative Unified API Protection (UAP) platform from Cequence Security and Vercara, a leading provider of cloud-based services that secure online experiences, are teaming up to strengthen the cybersecurity landscape by combining!-->…
A New K-12 ThreatDown Bundle from Malwarebytes Protects Schools and Districts Against Cyberattacks
A global leader in real-time cyber protection, Malwarebytes today announced the release of ThreatDown K-12 Bundle, which combines the cybersecurity services and technologies required by K–12 educational institutions into a simplified,!-->…
A More Aggressive Cybersecurity Approach Provides More Protection and Information
There are two approaches to cybersecurity: the reactive approach, which is implemented after security protocols have failed, and the proactive approach, which can lead you down the proverbial rabbit hole and into an intelligence gathering!-->…
The CISO’s Most Effective Weapon: Threat Intelligence
Today’s most successful CISOs embrace cyber threat intelligence (CTI). Contextual, high-fidelity intelligence helps security teams understand attackers and prioritize responses to give organizations the upper hand.
How to Avoid Phishing Attacks
As a small or medium business professional, chances are you’ve heard about phishing. Phishing scams—ploys that cybercriminals use to trick unsuspecting people into revealing sensitive information and steal their identities—are a serious!-->…
IG finds lapses in DHS IT security
An audit of the Department of Homeland Security's fiscal information security practices noted some progress but found that DHS components did not maintain their security programs on a continuous, year-round basis.The report from the DHS!-->…
The latest NIST security guide, open CRS, GSA spin-up portal offerings and more
Guidance on identity management for electric firms is being sought after by NIST. Comments are being accepted on a security guide for power firms by the National Cybersecurity Center of Excellence, which is a division of the National!-->…
KEEPING CYBERSECURE While on the Move
When traveling, there are other things besides your suitcases that can go missing. Cybercriminals are prepared to take advantage of unwary tourists and steal confidential information, contributing to the record 16.7 million identity theft!-->…
The Likelihood of a Cyber Attack Compared
While the cost of a cyber attack is often discussed, we seldom hear about just how common these attacks actually are. Numerous security experts believe that a cyber attack or breach of catastrophic proportions is no longer a matter of if,!-->…
Make security part of your client systems.
Your organization might have many reasons for refreshing desktops, laptops, tablets, and other devices. You might want to improve mobile productivity and create a more future-ready workforce by providing access to the latest operating!-->…
Expert on cybersecurity at the Springs conference: There are no secure networks.
A cybersecurity expert stated on Wednesday at a conference in Colorado Springs that organizations and governmental bodies who manage computer networks should anticipate that hackers will overcome their defenses and should instead!-->…
Cybersecurity in the Cloud: A White Paper
Cloud services have changed the face of business, offering scalability, efficiency and cost savings not available with onpremises IT infrastructure. The cloud makes it easier for organizations to manage the ever-increasing amount of data!-->…
Quantum Readiness Toolkit: Building a Quantum-Secure Economy
Accelerating developments in quantum computing pose new challenges to cybersecurity. The rise of quantum computers has the potential to compromise existing cryptographic systems, putting secure communications and data protection at risk.!-->…
Blackbaud and the Public Cloud
As the leading provider of software for powering social impact, Blackbaud never stops working to earn and keep your trust. No other partner combines cloud innovation with our deep understanding of the unique needs of purpose-led!-->…
Security and compliance in Compliant Cloud
Except for the ability to digital innovation, the traditional reasons of why an organization turns to the public cloud is cost savings or to augment their private cloud capacity. Although these reasons are still valid, a more important!-->…
VIAVI’s Observer Platform Innovations Increase Visibility Throughout Applications, Users, and…
With the major improvements to the Observer Platform that Viavi Solutions Inc. (VIAVI) (NASDAQ: VIAV) announced today, IT teams may now further optimize network availability, productivity, and compliance. Critical new capabilities in!-->…
For business clients, RemotePC is providing a high-performance remote desktop solution that now…
One of the quickest and most dependable remote desktop services available, RemotePC, is now providing enterprise users with a very cost-effective and scalable endpoint cloud backup solution that can be expanded to an infinite amount for a!-->…
Fusion Connect Reports Strategic Leadership Shifts to Promote Innovation and Growth
Mario DeRiggi, Chief Revenue Officer of Fusion Connect, a premier worldwide managed communications service provider (MCSP) and Microsoft Cloud Solution Provider (CSP), has announced his retirement. Mario has contributed unparalleled!-->…
Persistent Announces Strategic Collaboration Agreement with AWS to Accelerate Generative AI Adoption
In order to speed up innovation and the creation of generative AI solutions for clients, Persistent Systems, a pioneer in global digital engineering and enterprise modernization, announced a multi-year Strategic Collaboration Agreement!-->…
Keeper Security’s New Open Source Project Guards Against Supply Chain Attacks
A brand-new open source project from Keeper Security, the industry leader in zero-trust and zero-knowledge cybersecurity software, enables software developers and DevOps to quickly and safely sign git commits using their Keeper vault. The!-->…
The first-ever CNAPP workflow optimizations for attack path analysis and software supply chain…
A leading provider of contemporary application security, Data Theorem, Inc., recently launched Cloud Secure, a Cloud-Native Application Protection Platform (CNAPP) that includes an industry-first attack path analysis of APIs and software!-->…
Healthcare Information Security The Human Touch
A recent Ponemon Institute study of medical theft estimates that the number of medical identity theft victims in 2013 at 1.83 million, of which, 36 percent incurred on average $18,660 in out-of-pocket costs. Based on that information, the!-->…
Analyzing the Accuracy and Time Costs of Web Application Security Scanners
When reviewing scanners, most vendors provide and host websites that are intentionally vulnerable in various ways. Web application security scanner vendors have seen a large number of vulnerabilities from varying web applications
Best Practices for Applying Threat Intelligence
Threat intelligence is one of the most talked-about areas of information security today. Recent research conducted by SC Media revealed that 46 percent of security professionals expect threat intelligence to be a very important part of!-->…
CAT SCAN: WHAT YOU NEED TO KNOW ABOUT THE FFIEC’S CYBERSECURITY ASSESSMENT TOOL
You might be confused as to what the regulatory bodies expect from your financial institution in terms of cybersecurity: what obligations do you have? What measures should you take? And how, exactly, will you be measured for compliance? If!-->…
“Data Center Trends And Network Security Impact”
"The data center is evolving rapidly with new technologies such as virtualization and cloud- computing, and software-defined networks. These have a fundamental effect on how network security is designed and deployed."
3 Approaches to Maintaining a Well-protected Virtual Environment
Virtualizing servers and desktops can bring enormous business benefits, but are virtual machines more secure than physical machines? The answer is no. While there may be a handful of attack vectors to which VMs are less prone - ransomeware!-->…