September 2, 2015 Getting Out: Data Exfiltration Gets Sophisticated 2 min read - Data exfiltration techniques are getting more sophisticated. How do companies protect their interests against attackers who are willing to get creative?
Identity & Access July 20, 2015 Remember to Lock the Front Door With Identity Governance 2 min read - The right identity governance solution can help organizations reduce audit risk, prevent toxic duty combinations and certify access to users.
Endpoint June 25, 2015 Take Your Mobile Security to the Next Level 5 min read - Enterprises today are embracing mobile technologies and the bring-your-own-device movement, but that means they must develop mobile security strategies.
Cloud Security June 12, 2015 The Insider Threat: A Cloud Platform Perspective 3 min read - Organizations can protect themselves from the dangers of an insider threat by implementing several cloud security best practices.
June 8, 2015 Enforceable AUPs Reduce Risk to Corporate Data, Study Shows 2 min read - Strict enforcement of acceptable use polices (AUPs) can dramatically reduce risk to corporate data that stems from employee Web traffic, a report showed.
April 28, 2015 Bodyprint Biometrics: Are People the New Password? 2 min read - Yahoo has introduced a new type of biometric security, Bodyprint, which allows users to unlock their mobile devices with multiple body parts.
Identity & Access March 13, 2015 Secure Access Powered by Intelligence: Are You Ready? 2 min read - An effective access management solution must be powered by intelligence to prevent illegitimate access, identify anomalies and proactively reduce risk.
Cloud Security February 26, 2015 Has Your Cloud Security Become a Juggling Act? 3 min read - Cloud security is what prevents many businesses from making the leap and adopting the cloud to manage their data and protect their information
Data Protection February 5, 2015 Batman Vs. Superman: The Battle for Password Security 3 min read - Batman and Superman may be two great superheroes, but neither makes a very secure password when it comes to protecting against cybercriminals.
Threat Intelligence February 4, 2015 Identifying the Insider Threat: The Benign and the Malignant 2 min read - Whether a disgruntled employee intentionally steals data or an unknowing co-worker accidentally releases information, the insider threat is real.