Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




Everyone knows that a chain is only as strong as its weakest link, and the same goes for software - its security is only as strong as its...

Qualitative vs Quantitative: Time to Change How We Assess the Severity of Third-Party Vulnerabilities?


A data breach impacting personal identifiable information (PII) can ruin someone's life, but an attack on critical health infrastructure...

The Health Care IT Security Challenge


Despite good intentions, ethical hackers are are sometimes prosecuted for their discoveries. Do they need broader legal protection?

Do Ethical Hackers Need Legal Protection?


Distributed denial of service (DDoS) attacks have plagued businesses and individuals alike for years, but is the end in sight? Blockchain...

Will Blockchain Technology Make DDoS Attacks Obsolete?


It felt like 2017 was a banner year for cybercrime, with headlines about the Equifax data breach and WannaCry ransomware, but in 2018 the...

Cybercrime 2018: The Enterprise Strikes Back


AI and IoT are bringing exciting new advancements, not just for ordinary folks, but for hackers as well. As malicious entities try to...

Cybersecurity: How New Advances Bring New Threats - And Vice Versa


Cybersecurity consists on an intricate web of technologies, all working side by side to protect your digital assets. Here we take a look at...

The Control Panel: Why the Best Vendor Cybersecurity Dashboards Are Complex


Threats are constantly evolving, and so must your security. Here we take a look at some of the most important aspects of modern...

Making Networks More Secure in the Age of Cybersecurity


We all want to protect our private information when browsing online, but how possible is it, really? Here we take a look at different types...

Internet Browsing and Security - Is Online Privacy Just a Myth?


The latest changes in NIST password requirements are welcome changes for both users and administrators: no more special characters, and no...

Simply Secure: Changing Password Requirements Easier on Users


Businesses are increasingly turning to public cloud options, but is that the right choice for your data? Learn about 6 of the biggest risks...

Is Your Organization Aware of These 6 Key Public Cloud Risks?


The internet of things (IoT) is growing, and so is the data it produces. Deep packet inspection (DPI) is a method of examining that data in...

How Deep Packet Inspection Is Changing Security in the IoT Age


Online privacy and security are big concerns these days, but protecting yourself online is easier than you might think.

5 Ways to Go Undetected Online


Passive biometrics is the use of biometric identity verification without the need for any user input. This can greatly improve security by...

How Passive Biometrics Can Help in IT Data Security


Software-defined WAN may seem like an ideal solution, but it can also add complexity to a network, and in the end, that can negate its...

The Darker Side of SD-WAN Service Insertion


Wearables are being used in enterprise more than ever, so with that, one must implement proper security. An appropriate enterprise mobility...

Adopting Wearables with Enterprise Mobility Management Solutions


Much of the world seems to be moving to mobile devices, which makes mobile device management more important than ever. But how do you...

7 Tips For Selecting an Enterprise Mobile Device Management Solution


Content delivery networks (CDNs) can be a quick and efficient way to deliver your content to users. But they aren't always the best option.

3 Situations Where You’re Better Off Not Using a CDN


Each and every year, new attacks leave behind a new normal in cybersecurity. So what will that look like in 2017? We asked experts to give...