Are Apple-specific threats on the rise?
Macs are really no more secure than a PC, but for many years there just weren’t as many out there because of the expense of the hardware and other issues. They've historically been a much less popular...
View ArticleWhat company execs can learn from Trump’s tweeting
Being judicious about social media use and staying away from WiFi protects executives and the enterprise.
View ArticleRise of as-a-service lowers bar for cybercriminals
Widespread availability of RaaS and botnet rentals for DDoS attacks make it easy for those without technical skills to enter into cyber crime
View ArticleWhat's the value in attack attribution?
Does attack attribution and knowing your adversaries really matter when it comes to securing the enterprise?
View ArticleProtecting the enterprise against mobile threats
Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to...
View ArticleDespite the gender barriers, women must persist in cyber
Overcoming obstacles that challenge women from entering and staying in the security industry
View ArticleSDN solves a lot of network problems, but security isn't one of them
As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.
View ArticlePrevent or detect? What to do about vulnerabilities
A good security program includes prevention, detection, and response, so security practitioners need to focus on the vulnerabilities that matter.
View ArticleAntivirus headaches that compromise browser security
Why web browsers leave security engineers constantly playing defense.
View ArticleAre we ready to bid the SIEM farewell?
SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.
View ArticleSMBs continue to be a target of cybercriminals
Believing that their security program is good enough means there's a good chance they’ll be breached. Here are some lessons from the bigs guys for the SMBs.
View ArticleResiliency, staying afloat in the face of cyber threats
Today's reality is that if the enterprise uses networked computers, they will get hit at some point. Not having and practicing a recovery plan could be the doom of any organization.
View ArticleRisks to the enterprise from the one-trick pony
Whether an adversary is highly skilled and targeting an organization or taking advantage of a black market service to make a few bucks, any threat is a threat.
View ArticleBe wary of vendors touting superior data science
Security vendors are jumping on the data science, machine learning, AI bandwagon, but don't believe the hype. Here's how to make sure the vendor you're evaluating can make good on its promises of data...
View ArticleCEOs' risky behaviors compromise security
If shadow IT is a problem with business decision makers, that may be a sign your senior security person isn't engaged at a high enough level.
View Article