Ensuring election integrity: The overlooked last mile of securing voter data

With 99 percent of America’s votes counted by computers, security experts agree that our elections remain extremely vulnerable for a cyberattack. Fourteen states are still using fragile voting equipment consisting of digital endpoints that travel from storage to polling places. With some voting machines being so old that officials can’t even tell if they’ve been…

Organizations feel ready to put highly sensitive data in the cloud

Many corporate employees are ready to store highly sensitive data in the cloud. However, many are still skeptical of the security posture of their own organizations, according to an Armor poll that fielded responses from 37,000 Twitter users over a 13-week period. Additional key findings show that reducing the cost of managing security, maintaining compliance,…

Security should be a top priority when transitioning to an SD-WAN solution

Barracuda Networks today released key findings from a new global research report, “Security, Connectivity, and Control: The Challenges and Opportunities of SD-WAN.” The study surveyed IT leaders and networking and security professionals to learn how widespread SD-WAN deployments are, how organizations are deploying them, and what benefits and challenges they’re seeing. The report includes data…

Your backup data sets can become a treasure trove for advanced threat detection

Despite ever increasing investments in security technologies, data breaches and cyber incidents are increasing at a relentless rate, and the problem is projected to keep getting worse. Industry research shows that attacks from ransomware, data compromise, malicious email and credential theft more than doubled to 160,000 incidents per year, with unreported incidents likely bringing the…

Organizations need to shift strategies, adopt a proactive approach to cybersecurity

The cybersecurity market has reached a point whereby organisations need to shift their strategies and have a new, proactive approach to their cybersecurity, according to a report by 451 Research. Hurdles that organizations need to overcome to successfully shift their strategies These were identified as: A profusion of tools and data that complicates – and…

You should prepare for the next mega data breach

As of September 2018, it’s been one year since the historical Equifax mega data breach that impacted nearly half of all consumers in the U.S. Since this monumental invasion of personal data, fraudsters have shown little to no notion of slowing down as evident by the continued emergence of additional data breaches. In fact, within…

Data privacy automation: Unlock your most valuable asset

In years past, data privacy was the purview of the chief privacy officer. However, increasingly, CTOs are being tasked with operationalizing a data privacy solution for the company. That’s because data privacy is fundamentally a data issue, with privacy being an outcome of a comprehensive data protection strategy. In a world of exploding data, it’s…

How internal dysfunction puts your network at risk

IDG polled 200 network and cybersecurity professionals across the U.S. & Canada, and found almost inevitable consequences for organizations where network and cybersecurity teams have conflicting objectives, are managed in a siloed way, and have unequal or incomplete network visibility. 86% of respondents admitted to experiencing at least one of the following due to a…