How storytelling, cut through with some pragmatic IT security risk input, might change this conversation:
Browsing: Breaches
97% consider data loss to be a growing concern and 94% agree that an encrypted data storage device is preferable to an unprotected drive for daily use.
A leading Internet security provider recently released a report revealing how attackers exploit end-users’ human flaws
Like a lot of our fellow information security professionals, we’re once again attending the RSA Conference, being held this week in San Francisco.
However, BYOD as a practice does come with its share of pitfalls, the biggest being confidentiality and security of company data.
Pass-the-Hash attacks represent a significant risk to organizations because they are frequently used as an attack vector in advanced threats.
Tripwire, have announced a 240% increase in the amount of monetary contributions donated to Oregon charities in 2013 over 2012 contributions.
The Bring Your Own Device (or BYOD) policy allows employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace
Target announced that 110 million customer cards had fallen into the hands of hackers. That means that 1 in 3 Americans was affected by this cyber attack.
Tenable Network Security, the leader in real-time vulnerability and threats management, have announced the results of a February 2014 commissioned study