Recent Articles
-
Privileged Account Takeovers Pose Major Risks
Cyber security Privileged Account Takeovers Pose Major Risks Here’s a look at areas of high risk, such as privileged account takeovers, with which enterprises need help to improve their security. Account Takeovers 61% of respondents cited privileged account takeover as the most difficult stage of an attack to mitigate, up from 44% last year. Mitigation…
-
Arbor Enlists Partners to Help Fight DDoS Attacks
Moving to provide channel partners with access to a portfolio of technologies and services for preventing distributed denial-of-service (DDoS) attacks, Arbor Networks, a unit of Netscout, revamped its product lineup. In addition, Arbor Networks is now working with Cisco to making it simpler to embed its DDoS protection software directly within a Cisco ASR 9000…
-
EMV Chip-Card Deadline Creates Channel Mandate
Your customers who accept credit cards as payment need to be EMV-compliant, and the closer they get to achieving compliance by the Oct. 1, 2015, deadline, the better. Many companies will not meet the deadline for new fraud-liability rules and will have to scramble to address the new requirements. EMV is the new Europay-MasterCard-Visa protocol…
-
How Cloud, IoT Are Altering the Security Landscape
Security threats How Cloud, IoT Are Altering the Security Landscape Cyber-threats continue to evolve as businesses adopt public clouds and IoT devices. Here’s why businesses should pay more attention to security. Ransomware on the Rise New ransomware samples increased 58% in Q2 from Q1 due to fast-growing new families, including CTB-Locker and CryptoWall. The total…
-
In Search of a Context-Aware Security Strategy
Context-aware security In Search of a Context-Aware Security Strategy Seeking to strike a balance between security and end-user productivity, many firms are looking for some form of context-aware security, which prioritizes threats. IT Security Priorities IT pros (87%) and business execs (86%) agree that IT security is a much higher priority than end-user convenience. IT…
-
Apple Devices Creating Blind Spot for IT Security
Apple and IT security Apple Devices Creating Blind Spot for IT Security A recent study finds that most Apple devices used at work have little or no supervision from IT. A surprising percentage of these devices are employee-owned. Prevalence of Apple Devices in the Workplace 45% of workers surveyed use at least one Apple device…