Ransomware Attacks on the Rise Targeting Hospitals and Federal Agencies

Don’t let your data be held ransom

Ransomware attacks are on the rise, targeting corporate networks, hospitals and now federal agencies. Find out how serious the threat is, and what you can do to protect your organization.

Continue Reading

Who’s Minding the Data Store?

The massive Panama Papers data breach holds valuable lessons for anyone responsible for securing IT systems and data.

The sheer scope of “the biggest data leak in history” has prompted many to wonder, how could the diversion of 2.6 terabytes of data go unnoticed? But while the postmortems may be fascinating, the most useful takeaway from this episode may be the crucial importance of maintaining real-time visibility into your network and where your data is going.

Continue Reading

The Not-So-Hidden Risk Behind the Apple Encryption Controversy

If Apple cooperates with FBI, who will watch the watchers?

This article offers our point of view on the controversy surrounding the FBI’s request that Apple create an unencrypted version of the iPhone operating system.

Continue Reading

Firewall Hole Punching: Known, Unknown, and Unexpected Risks

Many companies choose to punch a hole in their firewall to connect applications or systems – even though this presents a security risk.

IT often chooses to punch holes in firewalls, yet doing so can present security risks. This article looks at ways to protect yourself when hole punching is required and how to prepare for unexpected vulnerabilities.

Continue Reading

3 Signs Your IT Security Strategy Needs Updating in 2016

Is Your Security Stack Effective? 3 Signs Your IT Security Stack Needs Your Attention Now.

Do you know which signs indicate that your security stack is falling short? From your firewall to antivirus to security audits and malware-removal software, you should know the 3 key signs that highlight shortcomings in traditional security solutions … and what you need to do to take action.

Continue Reading

5 Flawed IT Security Tools Still Widely Used in 2016

It’s 2016 and 5 of the most commonly used IT security tools have significant flaws that are leaving companies unprotected. How will those gaps be filled?

Every year, we see the same familiar components of the conventional security stack aimed at safeguarding IT systems and data. But it’s becoming clear that these tools are falling behind when it comes to protecting against data breaches. Is 2016 when we start to see real change? We take a look at the gaps, and what can help fill them.

Continue Reading

The VTech Data Breach and the Internet of Things

The latest example of a security data breach is almost as bad as the idea of thieves stealing toys before the holidays. Or could it be worse? Learn how the Internet of Things and a lack of security experience led to a significant data breach at a leading digital toymaker.

Continue Reading

Wearable Technology and Security – Too Soon to Be Worrying?

Wearable devices are one of the fastest-growing sectors in technology. As smart watches, fitness trackers, and other devices increasingly “walk into” the enterprise and seek to be connected, what should IT and security professionals be doing?

Continue Reading

Fit to be Tied? Fitness Tracking Device Presents Unexpected Malware Risk

A recently uncovered malware vulnerability may mean that FitBit tracking devices are highly susceptible to attack. What should you do to protect the health and fitness of your network?

Continue Reading

Three Tech Trends that Make Endpoint Modeling Essential

Three industry-wide trends are making endpoint modeling an essential complement to the traditional security stack. It’s time to plug the holes left open by conventional security solutions. Firewalls, antivirus, and malware removal are still necessary but not sufficient to keep IT systems and data secure.

Continue Reading