Security

Recent Articles

  • Arbor Enlists Partners to Help Fight DDoS Attacks

    Moving to provide channel partners with access to a portfolio of technologies and services for preventing distributed denial-of-service (DDoS) attacks, Arbor Networks, a unit of Netscout, revamped its product lineup. In addition, Arbor Networks is now working with Cisco to making it simpler to embed its DDoS protection software directly within a Cisco ASR 9000…

  • EMV Chip-Card Deadline Creates Channel Mandate

    Your customers who accept credit cards as payment need to be EMV-compliant, and the closer they get to achieving compliance by the Oct. 1, 2015, deadline, the better. Many companies will not meet the deadline for new fraud-liability rules and will have to scramble to address the new requirements. EMV is the new Europay-MasterCard-Visa protocol…

  • How Cloud, IoT Are Altering the Security Landscape

    Security threats How Cloud, IoT Are Altering the Security Landscape Cyber-threats continue to evolve as businesses adopt public clouds and IoT devices. Here’s why businesses should pay more attention to security. Ransomware on the Rise New ransomware samples increased 58% in Q2 from Q1 due to fast-growing new families, including CTB-Locker and CryptoWall. The total…

  • In Search of a Context-Aware Security Strategy

    Context-aware security In Search of a Context-Aware Security Strategy Seeking to strike a balance between security and end-user productivity, many firms are looking for some form of context-aware security, which prioritizes threats. IT Security Priorities IT pros (87%) and business execs (86%) agree that IT security is a much higher priority than end-user convenience. IT…

  • Apple Devices Creating Blind Spot for IT Security

    Apple and IT security Apple Devices Creating Blind Spot for IT Security A recent study finds that most Apple devices used at work have little or no supervision from IT. A surprising percentage of these devices are employee-owned. Prevalence of Apple Devices in the Workplace 45% of workers surveyed use at least one Apple device…

  • Breach Recovery Costs More in Virtual Environments

    Security breach costs Breach Recovery Costs More in Virtual Environments Security breaches on virtual environments cost enterprises more than those on physical environments and lead to the added cost of hiring outside experts. High Virtualization Usage 62% of businesses use virtualization in one form or another. Twice the Cost Businesses pay twice as much to…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.