June 30, 2016 Latest Ponemon Study Reveals More Enterprises Embracing an Encryption Strategy 2 min read - A recent survey from the Ponemon Institute detailed how organizations across industries are embracing an encryption strategy to protect critical data.
Cloud Security June 30, 2016 Integrated Security Solutions for Hybrid Cloud Deployments 2 min read - Special security solutions are needed to protect hybrid cloud environments through managed access, data protection and network visibility.
June 28, 2016 The Fansmitter Method: Stolen Data’s New Sound? 2 min read - Security researchers described a new method of data theft called Fansmitter, which uses cooling fans to slowly exfiltrate information.
Data Protection June 24, 2016 Can You Still Protect Your Most Sensitive Data? 3 min read - Companies in Silicon Valley and beyond are questioning how they should be protecting their sensitive data — if they choose to keep it at all.
Data Protection June 20, 2016 GDPR: How to Prepare in the Calm Before the Storm 3 min read - The General Data Protection Regulation (GDPR) has finally arrived in the EU. Here's what organizations around the world can do to be prepared.
Retail June 10, 2016 Retail Security: Industry Provides Rich Pickings for Cybercriminals 3 min read - Retail security presents a huge challenge for organizations in the industry, but it is essential that they enact a holistic security strategy.
June 9, 2016 Worldwide Worry: New National Exposure Index Ranks Most Hackable Countries 2 min read - The National Exposure Index recently ranked the world's most hackable countries, and the results may surprise security professionals.
Retail June 7, 2016 Retail IT Professionals Feel More Prepared for Data Breaches 3 min read - A recent survey showed that retail IT professionals feel they are prepared for data breaches, though other data doesn't fully support their belief.
June 1, 2016 ‘Perfect’ Data Exfiltration Demonstrated 2 min read - Covert data exfiltration techniques can be perfected with the help of 10 commandments, which were recently laid out by researchers.
May 24, 2016 New Method for Random Number Generation Devised at UT Austin 2 min read - A breakthrough in random number generation has the potential to result in stronger encryption— and, ultimately, improved cybersecurity.