Security

Recent Articles

  • Privileged Account Takeovers Pose Major Risks

    Cyber security Privileged Account Takeovers Pose Major Risks Here’s a look at areas of high risk, such as privileged account takeovers, with which enterprises need help to improve their security. Account Takeovers 61% of respondents cited privileged account takeover as the most difficult stage of an attack to mitigate, up from 44% last year. Mitigation…

  • Arbor Enlists Partners to Help Fight DDoS Attacks

    Moving to provide channel partners with access to a portfolio of technologies and services for preventing distributed denial-of-service (DDoS) attacks, Arbor Networks, a unit of Netscout, revamped its product lineup. In addition, Arbor Networks is now working with Cisco to making it simpler to embed its DDoS protection software directly within a Cisco ASR 9000…

  • EMV Chip-Card Deadline Creates Channel Mandate

    Your customers who accept credit cards as payment need to be EMV-compliant, and the closer they get to achieving compliance by the Oct. 1, 2015, deadline, the better. Many companies will not meet the deadline for new fraud-liability rules and will have to scramble to address the new requirements. EMV is the new Europay-MasterCard-Visa protocol…

  • How Cloud, IoT Are Altering the Security Landscape

    Security threats How Cloud, IoT Are Altering the Security Landscape Cyber-threats continue to evolve as businesses adopt public clouds and IoT devices. Here’s why businesses should pay more attention to security. Ransomware on the Rise New ransomware samples increased 58% in Q2 from Q1 due to fast-growing new families, including CTB-Locker and CryptoWall. The total…

  • In Search of a Context-Aware Security Strategy

    Context-aware security In Search of a Context-Aware Security Strategy Seeking to strike a balance between security and end-user productivity, many firms are looking for some form of context-aware security, which prioritizes threats. IT Security Priorities IT pros (87%) and business execs (86%) agree that IT security is a much higher priority than end-user convenience. IT…

  • Apple Devices Creating Blind Spot for IT Security

    Apple and IT security Apple Devices Creating Blind Spot for IT Security A recent study finds that most Apple devices used at work have little or no supervision from IT. A surprising percentage of these devices are employee-owned. Prevalence of Apple Devices in the Workplace 45% of workers surveyed use at least one Apple device…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.