Archive

Archive

Smart Prevention: How Every Enterprise Can Create Human Firewalls

Organizations of all sizes should include both human firewalls and virtual tools in their cybersecurity budgets. The average cost of a data breach is now¬†$3.92 million, according to IBM and Ponemon. Hackers are taking advantage of the many smart and ... »

Back-to-School Scams Target Students with Library-Themed Emails

Students should keep their eyes peeled for phishing emails purporting to be from their colleges, as well as online student resources laced with malware, researchers warn. College students settling back into school might want to think twice before clicking on ... »

Overburdened SOC Analysts Shift Priorities

Many SOC analysts are starting to shut off high-alert features to keep pace with the volume, new study shows. Yet another red flag that the security operations center is burning: Most SOC analysts now say their primary role is to ... »

Privileged Threats & the Top-6 Privileged Access Security Priorities

Privileges facilitate essential operational functions across an enterprise, enabling users, applications, and system processes elevated rights to access specific resources and complete work-related tasks. Yet, the potential for misuse or abuse of privilege by insiders, malware, and external threat actors ... »

Rethinking Security in Cloud Networking

Every CXO worries about security because the perimeter is changing; in fact, there are no walls for protection. The lines between cloud, workloads, applications, enterprise networks and hosts are blurring and the challenges are getting exponentially greater. The true security ... »