Security
Explore Articles
-
10 Things to Know About the Cost of DNS Attacks
10 Things to Know About the Cost of DNS Attacks Top Five Concerns About DNS Attack Protection A majority of…
-
Security Strategies Must Be Integrated
By Steve Durbin The rapid evolution of technology, in combination with the economic upheaval of the last few years, has…
-
Enterprise Still Main Target of DDoS Attacks
Enterprise Still Main Target of DDoS Attacks China Remains Largest Attack Traffic Originator China maintained its position as the originator…
-
Health Care, Retailers Are ‘Sitting Ducks’
Health Care, Retailers Are ‘Sitting Ducks’ Industry Sectors Covered Financial Services, E-commerce: e-tailers and retailers, Other: logistics, airlines, travel, social…
-
Mobile Malware, Ransomware Increases in 2014
Mobile Malware, Ransomware Increases in 2014 Spam Levels Dropped 72% of e-mail traffic is unwanted advertising, but the amount of…
-
Key Management a Barrier to Encryption Adoption
Key Management a Barrier to Encryption Adoption Encryption Deployment Is Rising Steadily 35% of those surveyed have an encryption strategy,…
-
Convoluted Security Processes Hamper Productivity
Convoluted Security Processes Hamper Productivity Convoluted Security Processes Threaten Productivity Manual processes, limited visibility into security policies, and poor change…
-
AETs: The Dirty Little Truth About Security
AETs: The Dirty Little Truth About Security Number of Admitted Breaches Roughly one in five respondents (22%) admits their network…
-
Nine Steps to Defeating the Heartbleed Bug
Nine Steps to Defeating the Heartbleed Bug Upgrade OpenSSL to 1.0.1g Users unable to immediately upgrade OpenSSL to 1.0.1g can instead…
-
Inside the NIST Framework to Improve Cybersecurity
Inside the NIST Framework to Improve Cybersecurity Technology-Neutral NIST Framework Provides a Mechanism for Enterprises to: 1. Describe their current…