Securing Your Enterprise Assets While Traveling for Work

Traveling for work is a regular occurrence for many of us. Most of the time, traveling for client meetings, conferences, team meetings and other work-related activities also means taking a laptop or other portable devices traveling too. These devices could easily include your company’s IP, strategic plans, financials or other sensitive enterprise assets. With this…

The Pick of 2017 Cybersecurity Conferences

Cybersecurity conferences provide excellent opportunities to network with peers, learn about the latest trends in security, engage with vendors and see firsthand the latest developments in technology. Here is a roundup of some of the most interesting 2017 cybersecurity conferences.

The Four Leading Security Threats of 2017

The security landscape is constantly evolving and will continue to evolve in 2017. Long-standing security threats will take on new dimensions. Social engineering, for example, will become an output as well as an input. At the same time, the Internet of Things (IoT) continues to open new threat vectors. The new year will certainly bring…

User Behavior Analytics: Perfect for Analysis but Not Security

How many times have you read or heard about user behavior analytics (UBA)? Today this term applies to security managers and auditors but not to security administrators. User behavior analytics enable IT teams to track and quickly analyze user behavior anomalies and monitor watch-lists, trends and many other factors relative to users. UBA is a…

Fighting Advanced Ransomware Attacks Requires Game-Changing Technology

Ransomware is one of the fastest-growing cyber-security threats facing organizations and individuals today. Attackers are holding everything from government records to health care equipment and even the keys to entire transit systems for ransom. According to new data from IBM, victims are paying up. More than half of the business executives that responded to the…

How to Find and Remediate Vulnerabilities in Real Time

Every business, large or small, must be able to remediate vulnerabilities that can threaten to undermine all its hard work and success. The security analysts and IT operators at these organizations have surely heard of household-name vulnerabilities like Heartbleed and Shellshock. But do they have all the knowledge and tools they need to track and…