Security
Explore Articles
-
CIOs Are Concerned About the Impact of the GDPR
CIOs Are Concerned About the Impact of the GDPR CIOs Are Concerned About the Impact of the GDPR With the…
-
Security Programs Aren’t as Efficient as IT Thinks
Security Programs Aren’t as Efficient as IT Thinks Security Programs Aren’t as Efficient as IT Thinks Operations teams are frustrated…
-
How Machine Learning Helps With Web App Security
How Machine Learning Helps With Web App Security How Machine Learning Helps With Web App Security The percentage of data…
-
Ransomware Is no Match for Livingston County
Over the last few years, ransomware has emerged as an epidemic and has crippled businesses, educational institutions and government entities.…
-
Security Awareness Programs Need Full-Time Staff
Security Awareness Programs Need Full-Time Staff Security Awareness Programs Need Full-Time Staff Security awareness programs are more likely to be…
-
Linking Breaches, Brand Reputation & Stock Prices
Linking Breaches, Brand Reputation & Stock Prices Linking Breaches, Brand Reputation & Stock Prices Data breaches can damage brands and…
-
Automation Can Help IT With Security Breaches
Automation Can Help IT With Security Breaches Automation Can Help IT With Security Breaches A new study suggests automating processes…
-
Citizens, Government Share Cyber-Security Concerns
By Lalit Ahluwalia and Peter Hutchinson At the recent National Governors Association (NGA) summit on cyber-security in San Jose, Calif.,…
-
Secure Your Data, Not Just the Perimeter
Secure Your Data, Not Just the Perimeter Secure Your Data, Not Just the Perimeter A recent report recommends a “new…
-
Companies Grow More Vulnerable to Insider Threats
Companies Grow More Vulnerable to Insider Threats Companies Grow More Vulnerable to Insider Threats Insider threats are increasing, privileged IT…