February 4, 2016
with Chadd Kenney, Pure StorageIn this interview, Chad Kenney discusses how critical laying strategic foundational IT infrastructure is for success in the short-term and over the long haul. Read More >>>
February 2, 2016
Are you protecting the information that matters most? In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for security. For IT leaders, these security strategies for success are essential reading. Get started today.
January 29, 2016
An independent security researcherwas recently able to infiltrate Instagram’s servers and gain access to essentially every secret key and server. The level of access he was able to achieve in a short amount of time is shocking: once he gained access to the company’s SSL certificates, private keys and administrator credentials, everything was open to him. He was able to access company assets, such as source code and internal emails, as well as private customer data, including personal details, login credentials and images.
January 28, 2016
by Dean Wiech, Tools4everWhile as a whole, the IAM market has been growing, there have been certain areas and solutions that have, in particular, shown great growth. What are these and why have organizations of all sizes been implementing them? Read More >>>
January 28, 2016
Equip yourself with knowledge of today’s enterprise cyberthreats and security best practices by downloading the All About Identity eBook.
January 22, 2016
While technology has benefited retailers in many ways, it has also contributed to growing levels of fraud. Although EMV and other developments are helping to curb identity theft fraud and unauthorized transactions, “chargeback fraud” remains a major threat to eCommerce merchants. As the technology of electronic payment processing becomes nearly ubiquitous in the business world, online shopping is rapidly overtaking in-store sales for many items. But with any fast-evolving system, scammers find loopholes that can eat deeply into profits.
January 20, 2016
Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
January 19, 2016
Digital transformation comprises all the changes occurring due to the application of digital technology in all aspects of society. BYOD, IoT, advanced cyber attacks – everything’s happening at an accelerated pace, and only the science fiction writers can guess what’s next on the horizon. One thing that is certain, though, is that the current proliferation of end points requires diamond-sharp clarity about which network solutions will provide a holistic, real-time view of the network.
January 12, 2016
Most of us remember the myth of the Trojan War, when the Greeks attempted to defeat the city of Troy. The battles lasted nearly 10 years. Then one day the Greeks appeared to retreat, leaving behind a huge wooden horse as a gift to the Trojans. The Trojan Horse was brought inside the city gates allowing the enclosed Greek warriors to infiltrate the city. The Greek warriors opened the city gates to allow the rest of their army to enter and defeat Troy.
January 11, 2016
Gazing into the crystal ball for the coming 12 months, remember, the future ain’t what it used to be. It’s already here, but unevenly distributed. Good riddance of terrible 2015 which was the year of the data breach.
January 7, 2016
According to 451 Research’s new Voice of the Enterprise: Information Security quarterly study, more than 32% of the enterprises surveyed name Splunk as their primary Security Information and Event Management (SIEM) platform provider. In the 451 Research Vendor Window™, enterprises rated Splunk highest especially for querying capability and the ease of integrating new data feeds. Intel Security is the second highest rated vendor based on evaluations from its 380 existing customers.
January 7, 2016
Insurance is all about risk management. Like with any policy, a cyber security insurance policy is cheaper if you never have to use it. Unfortunately, in recent years, there has been a big uptick in cyber security attacks. This is pushing the cost of this type of insurance up dramatically and causing many insurance companies to cap coverage at $100 million.
January 5, 2016
Today there are various factors influencing the direction of security solutions over the next 5 years including. Watch this webcast to learn the trends disrupting the security market.
January 1, 2016
By Joe McKendrick, Author and Independent ResearcherVerizon just released the latest edition of its annual Data Breach Investigations Report, and it reveals that most data security breaches don’t have to happen – yet, they still do keep on taking place. Read More >>>
December 28, 2015
Glorium Technologies knows that plenty of people are interested in what to wait for in the IT world in 2016. That’s why, we decided to prepare infographic based upon Spicework report. Enjoy!
December 17, 2015
with Maureen Polte, Flexera SoftwareIn this interview, Maureen Polte from Flexera Software discusses why it’s important for enterprises to understand the risky behaviors associated with mobile apps that could compromise data security in today’s BYOD environment. Read More >>>
December 17, 2015
The demand to stay connected while driving is steadily growing and car manufacturers are keen to provide better and more innovative connected services to differentiate their brands and stay ahead of the competition. This is a global phenomenon, especially with Gen-Y car buyers who are used to a digitally connected lifestyle. In fact, some research indicates that a quarter billion of cars will be connected to the internet by 2020 (source: Gartner).
December 15, 2015
Wireless network is a valuable asset to a business that embraces the technology. It is, indeed, inexpensive and easy to set up and operate. The wireless network has undoubtedly increased enterprises’ performance and productivity. By having a central point of distribution, that entails the installation of a wireless adapter, a business can access the network from any part within the premises. Sharing of documents and hardware components such as printers, scanners, and photocopiers become a very smooth and efficient process. All the clutter and nightmare that comes with physically connecting all the computers and their peripherals is made almost non-existent, except for the few power cable needed here and there.
December 9, 2015
The $400 million of estimated losses from the 700 million records compromised in 2014, detailed in Verizon’s 2015 Data Breach Investigations Report, sends a collective shudder down the spines of organizations’ C-suites and IT departments. If, after creating what seems like a foolproof security strategy, the organization suffers a breach, the focus of attention oftentimes goes not to how the breach occurred but to who did it. Money and reputation are about to be lost, and someone is to blame.
December 7, 2015
Download this simple guide to protect your entire business when an outage occurs.
December 7, 2015
Access is the fundamental pillar that determines whether critical enterprise assets are safe or exposed. Being able to properly control access means the difference between a breach and brand reputation. These days, access is about more than just network passwords. It extends well beyond the borders of the enterprise. Global supply chains are increasingly complex. The global supply chain is intertwined intimately, and it doesn’t seem it will unravel itself anytime soon.
December 2, 2015
with Tejas Vashi, Learning@CiscoThe Internet of Everything (IoE) is bringing together people, process, data and things to make networked connections more relevant and valuable than ever before. Understandably, this is accelerating the pace of digital transformation. Read More >>>
November 24, 2015
This year that annual shopping frenzy in the U.S. known as Black Friday will take place on November 27, the day after Thanksgiving. Sales, according to the Black Friday website, will actually start early on Thanksgiving Day and extend throughout the weekend. Total sales are expected to top $80 billion. Also, the number of bargain hunters will increase this year to well over 300 million. Sales channels will include both brick and mortar stores as well as online retailers.
November 23, 2015
As the holiday shopping season approaches, the American Bankers Association is educating consumers about the new chip technology embedded in many credit and debit cards.
The new chip cards offers bank customers an added layer of security just in time for the holidays. The chip – a small metallic square on the front of the payment card – assigns a one-time code for each transaction, and makes it nearly impossible for fraudsters to create counterfeit cards.
November 19, 2015
Cybrary, the world’s first and only no-cost cyber security massive open online course (MOOC) provider, announced the availability of its Android-based mobile app that allows users with limited Web access – particularly in developing countries – to learn hacking, forensics and other cyber security skills on the go.
November 12, 2015
Chip and PIN cards are nothing new. For several years, retailers in Europe have accepted the cards, which transmit information about the transaction to the payment processor, including the card number and account details, via a secure token or one-time use code. These codes are practically useless to hackers, thereby protecting credit card users from having their financial data stolen. The cards themselves contain a chip, which when inserted into a special reader, makes the conversion; in order to complete the transaction, the customer must enter a PIN, instead of a signature.
November 11, 2015
Nikhil Premanandan, ManageEngineIn this interview, Nikhil Premanandan from ManageEngine discusses the importance of notifying DBAs the moment any anomalous activity is detected and finding the root cause, enabling a faster threat mitigation response. Read More >>>
November 11, 2015
Cybercrime is thriving … as demonstrated by several high-profile, online data breaches in the press recently. As static, on-premise security measures are increasingly becoming ineffective against attempts to steal data and take web services offline, many security professionals are left unsure how to best mitigate these evolving threats.
November 11, 2015
Data breaches have become so commonplace that we almost expect them. Credit cards are compromised when retail stores are hacked. Social Security numbers are at risk when government agencies or physician’s offices fall prey to phishing expeditions. And those are just the perils the average American faces with domestic hackers. It’s just as easy for people from far-flung countries – some of whom may be working on the behest of their governments – to infiltrate our computer systems and disrupt our way of life.
November 9, 2015
A new report by Allied Market Research titled, “World Hardware Encryption—Market Opportunities and Forecasts, 2014–2020” forecasts that the world hardware encryption market would garner revenue of $296.4 billion by 2020, registering a CAGR of 54.6% during the forecast period of 2015–2020. Hard disk drives are the most widely encrypted devices, accounting for the highest market share throughout analysis period. Asia-Pacific is the largest revenue generating region for hardware encryption, followed by North America and Europe.