Endpoint May 4, 2015 Mobile Avengers: Smashing Security Foes and Woes 2 min read - Mobile app management and a corporate app store provide good training grounds for increased security in a controlled mobile state.
Application Security May 1, 2015 How to Dramatically Improve Your Database Encryption 4 min read - Database encryption can be drastically improved through the use of hardware security modules (HSMs), which provide offline encryption services.
Banking & Finance April 30, 2015 The Damage of a Security Breach: Financial Institutions Face Monetary, Reputational Losses 2 min read - The financial services sector is facing a barrage of attacks, with many institutions having been subjected to damaging security breaches recently.
Government April 29, 2015 Feds Move Toward HTTPS Website Encryption 2 min read - A new policy announced by the White House in March requires federal websites to support traffic encryption within two years through HTTPS.
Endpoint April 27, 2015 Data and Content Security for the Mobile-First World 3 min read - Employees and enterprises are operating in an increasingly mobile-first world. Because of this, content security is of the utmost importance to executives.
Data Protection April 24, 2015 Top Tips for Surviving a Data Encryption Project 3 min read - Encrypting your data is an important step for keeping it secure. Follow these tips to keep your data encryption project running smoothly.
April 23, 2015 New Cyberattacks Put Public Officials’ Private Data at Risk 2 min read - New cyberattacks are putting public officials' private data at risk as cybercriminals use an informationg gathering technique known as doxing.
Endpoint April 20, 2015 Mobile Device Management to Security: “I’m Not Dead Yet!” 3 min read - Mobile device management should not be discounted as a service since 32 percent of mobile security incidents are caused by lost devices.
April 17, 2015 SearchBlox Vulnerabilities Underscore the Importance of Updating Enterprise Search Tools 2 min read - A set of four SearchBlox vulnerabilities could allow cybercriminals to conduct cross-site scripting attacks and cause other potential problems.
April 17, 2015 Verizon Report Suggests Data Breach Costs and Mobile Threat Perceptions Inaccurate 2 min read - Security experts may be overestimating the cost of a data breach and the extent of mobile device threats, according to a report from Verizon.