The Shifting Landscape of Security Controls, Part 2
Last month the Center for Internet Security released an update to its Critical Security Controls. Here's part two in a three post breakdown of the changes they made.
Last month the Center for Internet Security released an update to its Critical Security Controls. Here's part two in a three post breakdown of the changes they made.
Forget identity theft, an incident in Arkansas shows that plain old competition is behind at least some medical data theft.
Forget identity theft, an incident in Arkansas shows that plain old competition is behind at least some medical data theft.
Halloween is almost here – while this weekend will be full of ghosts and ghouls, the threats that may already exist in your IT environment can be even scarier. Here are the top threats that could be lurking in your environment and how to defend against them.
Halloween is almost here – while this weekend will be full of ghosts and ghouls, the threats that may already exist in your IT environment can be even scarier. Here are the top threats that could be lurking in your environment and how to defend against them.
Earlier this month the Center for Internet Security released an update to its Critical Security Controls. Here's part one in a three post breakdown of the changes they made.
Researches from the Singapore University of Technology and Design have developed a clever method to steal data from wireless printer networks that were otherwise assumed secure.
Researches from the Singapore University of Technology and Design have developed a clever method to steal data from wireless printer networks that were otherwise assumed secure.
Deciding between endpoint DLP and network DLP isn't always a simple task. Watch our video for a breakdown of the key differences between each approach and questions to help you choose the best solution for your data protection needs.
The claim by a self-described teenage “stoner” that he was able to compromise the personal email account of CIA chief John Brennan underscores the huge cultural challenge that even security-conscious organizations face.