May 2, 2023
Via: Network ComputingEmployees are a major source of security breaches within companies. Unfortunately, the majority of security solutions are aimed at the technical aspects of preventing security breaches, whether it is providing firewalls, AI detection mechanisms, zero-trust networks, encryption, or something else. […]
November 29, 2022
Via: Network WorldHaving thorough IT security usually means having a layered approach. Basic antivirus, for instance, might catch PC-based malware once a user downloads it, but you could try to block it before it ever reaches the user device, or at least […]
August 1, 2022
Via: CSOAs numerous data compliance laws proliferate across the globe, security professionals have become too focused on checking their requirements boxes when they should be focused on reducing risk. Can the two work harmoniously together? The answer depends on how effectively […]
May 10, 2022
Via: RCR Wireless NewsRed Hat said it’s prioritizing the enterprise adoption of edge compute architectures with new cross-portfolio announcements. The company made a number of edge-related product announcements on Tuesday. They took against the backdrop of Red Hat Summit, a mostly virtual event […]
May 3, 2022
Via: Network ComputingBased on their structure and components, 4G-LTE and 5G cellular protocols are more secure than Ethernet and Wi-Fi-connected IP networks. But when it comes to security, protocol isn’t everything; organizations deploying these networks need tools to ensure that those protocols […]
December 18, 2020
Via: CSOCyberattacks are targeting endpoints – and it’s a growing trend. Ponemon recently surveyed 671 IT and IT security professionals from global companies. Sixty-eight percent of respondents said the frequency of attacks has increased over the past 12 months. More than […]
September 10, 2020
Via: CSODuring times of uncertainty, people look for answers. Unfortunately for IT security professionals, that means these days employees fall victim to cyberattacks all too often. Attackers have taken advantage of the current state of affairs and are exploiting everyone’s desire […]
September 3, 2020
Via: CSOYour enterprise’s security team is entrusted with a critical mission: protecting systems, resources and users from phishing, ransomware, denial-of-service attacks, data theft, malware infection and assorted other attacks. Staying on top of emerging and evolving threats requires constant vigilance and, […]
Hardware, Monitoring&Analysis, Security
July 16, 2020
Via: Networkworld SoftwareIn a disconcerting event for IT security professionals, counterfeit versions of Cisco Catalyst 2960-X Series switches were discovered on an unnamed business network, and the fake gear was found to be designed to circumvent typical authentication procedures, according to a […]
February 26, 2020
Via: CSOIT security may, at times, seem an elusive goal. CISOs are facing multiple challenges. Digital transformation efforts, cloud and mobile implementations, and DevOps adoption have led to increasingly complex IT environments. These same trends have also expanded the attack surface. […]
November 15, 2019
Via: Cisco BlogYour business invests in all the latest security technologies. You run training. You meet your compliance requirements for scans and tests. You can stand up in front of the board and say with confidence “we’ve got this covered.” But are […]
August 14, 2019
Via: CSOFew complex professions change with the velocity of IT security. Practitioners are faced with an average of 5,000 to 7,000 new software vulnerabilities a year. Last year that number was a gob smacking 16,555. That’s like springing 13-45 new leaks […]
June 10, 2019
Via: CSOSixty-three percent of IT security professionals say the frequency of attacks has gone up over the past 12 months, according to Ponemon’s 2018 State of Endpoint Security Risk report — and 52% of respondents say all attacks cannot be realistically […]
August 23, 2018
Via: CSOThe School District of Philadelphia is the eighth-largest public school district in the United States, with more than 134,000 students and more than 18,000 staff. “Although we’re large, we are an inner-city district,” Keith Busby, executive director for IT Security […]
July 27, 2018
Via: CSONetwork engineer Jose Arellano concedes that “the hardest part of my day” is keeping the network safe for 12,700 students, 1,900 staff and more than 10,000 connected devices at West Aurora School District 129 in Illinois. The two-person security team […]
April 12, 2018
Via: CSOIt was one of the 17 biggest data breaches of the 21st century: October 2013, hackers stole login information and nearly 3 million credit card numbers from 38 million Adobe users. The company is still dealing with the cleanup, and […]
September 19, 2016
Via: CSOStephen Boyer, CTO and co-founder of BitSight, knows one of the biggest threats to your company’s tech security: the possibility that it might buy another company. He points to a survey from West Monroe Partners that found that 40% of […]