APT: Looking Past the Hype to Defend Against Today’s (Actual) Advanced Threats
So-called advanced persistent threats (APTs) have been the subject of much hype of the past few years – but that doesn’t mean we should be overlooking the truly advanced threats out there.
What is Cloud Storage Security? Securing Cloud Storage Usage
As cloud adoption continues to grow rapidly at the enterprise level, IT and security departments must provide for secure use of cloud storage and services.
The Cost of a Data Breach? $88 Million
There’s a lot of debate about how much data breaches and hacks cost companies – except when there’s not, as with the hack of UK firm TalkTalk, which put the cost at around $88 million.
Detecting and Mitigating USB Propagating Malware (Screenshot Demo)
Put those hot glue guns away – here’s how to detect and mitigate USB propagating malware.
Red Flag: Pentagon Contractors Get Two Year Extension on Data Protection Rule
In a worrying sign, Department of Defense Contractors requested and won an almost two year extension on new rules that would require them to protect sensitive information stored on their networks.
Drug Development and Intellectual Property Theft
Competitive forces in the pharmaceutical industry have led to increased intellectual property theft. As this trend continues, pharmaceutical companies and manufacturers of all industries must focus on protecting the sensitive data that their competitive advantage is built on.
Criminalizing the Crime: Punishing Data Theft
A convicted hacker in Turkey received a 334-year sentence for data theft, while a UK official calls for stronger sentences there.
WIPOut: The Devastating Business Effects of Intellectual Property Theft
A recent 60 Minutes feature told of China’s current cyber-espionage campaign that stole one company’s intellectual property in its near entirety. As China’s campaign continues targeting U.S. companies across every industry, those companies must take steps to protect IP and preserve their competitive advantage.
Could you pass a security audit? Take our security audit readiness assessment to find out
Test your level of preparedness for a security audit with this interactive assessment.
What is FTP Security? Securing FTP Usage
File Transfer Protocol is widely used in corporate networks yet has inherent data security risks. Here’s an overview of some of the challenges of FTP security and methods to address them.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.