Advertisement
Top

Tag: it security


Security

Employees: The next security frontier?

May 2, 2023

Via: Network Computing

Employees are a major source of security breaches within companies. Unfortunately, the majority of security solutions are aimed at the technical aspects of preventing security breaches, whether it is providing firewalls, AI detection mechanisms, zero-trust networks, encryption, or something else. […]


Security

5 DNS services to provide a layer of internet security

November 29, 2022

Via: Network World

Having thorough IT security usually means having a layered approach. Basic antivirus, for instance, might catch PC-based malware once a user downloads it, but you could try to block it before it ever reaches the user device, or at least […]


Security

5 ways to unite security and compliance

August 1, 2022

Via: CSO

As numerous data compliance laws proliferate across the globe, security professionals have become too focused on checking their requirements boxes when they should be focused on reducing risk. Can the two work harmoniously together? The answer depends on how effectively […]


Software, Technology

Red Hat prioritizes enterprise edge adoption and hybrid cloud with new announcements

May 10, 2022

Via: RCR Wireless News

Red Hat said it’s prioritizing the enterprise adoption of edge compute architectures with new cross-portfolio announcements. The company made a number of edge-related product announcements on Tuesday. They took against the backdrop of Red Hat Summit, a mostly virtual event […]


Mobile Networks

Can IT Security Solutions Protect Private Cell Networks?

May 3, 2022

Via: Network Computing

Based on their structure and components, 4G-LTE and 5G cellular protocols are more secure than Ethernet and Wi-Fi-connected IP networks. But when it comes to security, protocol isn’t everything; organizations deploying these networks need tools to ensure that those protocols […]


Monitoring&Analysis, Security

5 reasons the security of your endpoints could be at risk

December 18, 2020

Via: CSO

Cyberattacks are targeting endpoints – and it’s a growing trend. Ponemon recently surveyed 671 IT and IT security professionals from global companies. Sixty-eight percent of respondents said the frequency of attacks has increased over the past 12 months. More than […]


Monitoring&Analysis, Security

4 Growing Cybersecurity Attacks to Watch out for—and How to Reduce Your Risk

September 10, 2020

Via: CSO

During times of uncertainty, people look for answers. Unfortunately for IT security professionals, that means these days employees fall victim to cyberattacks all too often. Attackers have taken advantage of the current state of affairs and are exploiting everyone’s desire […]


Monitoring&Analysis, Security

How to choose the right security training provider for your team

September 3, 2020

Via: CSO

Your enterprise’s security team is entrusted with a critical mission: protecting systems, resources and users from phishing, ransomware, denial-of-service attacks, data theft, malware infection and assorted other attacks. Staying on top of emerging and evolving threats requires constant vigilance and, […]


Hardware, Monitoring&Analysis, Security

Counterfeit Cisco switches raise network security alarms

July 16, 2020

Via: Networkworld Software

In a disconcerting event for IT security professionals, counterfeit versions of Cisco Catalyst 2960-X Series switches were discovered on an unnamed business network, and the fake gear was found to be designed to circumvent typical authentication procedures, according to a […]


Monitoring&Analysis, Security

2020 Security: Securing Your Business with an Integrated Security Platform

February 26, 2020

Via: CSO

IT security may, at times, seem an elusive goal. CISOs are facing multiple challenges. Digital transformation efforts, cloud and mobile implementations, and DevOps adoption have led to increasingly complex IT environments. These same trends have also expanded the attack surface. […]


Monitoring&Analysis, Security

New research: Are you really ready for today’s security threats?

November 15, 2019

Via: Cisco Blog

Your business invests in all the latest security technologies. You run training. You meet your compliance requirements for scans and tests. You can stand up in front of the board and say with confidence “we’ve got this covered.” But are […]


Monitoring&Analysis, Security

12 things every computer security pro should know

August 14, 2019

Via: CSO

Few complex professions change with the velocity of IT security. Practitioners are faced with an average of 5,000 to 7,000 new software vulnerabilities a year. Last year that number was a gob smacking 16,555. That’s like springing 13-45 new leaks […]


Monitoring&Analysis, Security

6 ways malware can bypass endpoint protection

June 10, 2019

Via: CSO

Sixty-three percent of IT security professionals say the frequency of attacks has gone up over the past 12 months, according to Ponemon’s 2018 State of Endpoint Security Risk report — and 52% of respondents say all attacks cannot be realistically […]


Monitoring&Analysis, Security

Fireside Chat with School District of Philadelphia: Securing Virtual Servers, Chromebooks, and Student Data While Saving Six Figures

August 23, 2018

Via: CSO

The School District of Philadelphia is the eighth-largest public school district in the United States, with more than 134,000 students and more than 18,000 staff. “Although we’re large, we are an inner-city district,” Keith Busby, executive director for IT Security […]


Monitoring&Analysis, Security

Keeping pace with security automation

July 27, 2018

Via: CSO

Network engineer Jose Arellano concedes that “the hardest part of my day” is keeping the network safe for 12,700 students, 1,900 staff and more than 10,000 connected devices at West Aurora School District 129 in Illinois. The two-person security team […]


Monitoring&Analysis, Security

Adobe’s CSO talks security, the 2013 breach, and how he sets priorities

April 12, 2018

Via: CSO

It was one of the 17 biggest data breaches of the 21st century: October 2013, hackers stole login information and nearly 3 million credit card numbers from 38 million Adobe users. The company is still dealing with the cleanup, and […]


Security

How to keep IT security at the forefront during a merger

September 19, 2016

Via: CSO

Stephen Boyer, CTO and co-founder of BitSight, knows one of the biggest threats to your company’s tech security: the possibility that it might buy another company. He points to a survey from West Monroe Partners that found that 40% of […]