Eight Ways to Stay Secure While Traveling

If you travel, you’re a target for thieves—and your digital assets are highly-prized. Thieves covet usernames and passwords that give them access to a treasure trove of information and the chance to go for a ride on your dime.

What’s a road warrior to do? Common sense dictates never entering your username or password into a hotel or business center computer—or any public computer for that matter.

> Read More

Emerging Endpoint Security Trends for SMB

How can SMBs protect their networks and digital assets without breaking the bank?

For all the focus on mega-enterprise security—and all the high-profile data breaches at major corporations—enterprises aren’t alone in the endpoint security battle.

Think about it for a minute. When was the last time you got through a day of e-mail without a spam e-mail with a nefarious link or attachment?

> Read More

Why the MDM Rush?

With mobile devices continuing to drive consumer and enterprise marketplace trends, there is no lack of Mobile Management Device (MDM) vendors to choose from—and one more just entered the market.

Lumension just rolled out Lumension Endpoint Management and Security Suite with Mobile Device Management v8.0. What sets it apart from the scores of other vendors?

> Read More

The Real Infosec Employee Shortage

When a company like HP offers up a $250,000 grant to attract IT security workers to the field, you know there’s a backstory. In this case, HP’s Scholarship for Women Studying Information Security (SWSIS) program hopes to prime the pump of IT security workers entering the market.

The shortage is real—and critical. The IT security jobs market will be 40 percent vacant in 2014,

> Read More

Is Mobile Shopping Safer This Holiday Season?

With the holiday shopping season upon us, scammers, cyber criminals and other nefarious characters come out of the Internet woodwork. Security experts are warning consumers should be cautious during the holiday shopping season to protect personal and financial data from being compromised. Banks and retailers should also be on high-alert.

Consider just a couple of the telling statistics: Trend Micro researchers identified more than 200,000 malware infections targeting online banking in the third quarter.

> Read More

How to Protect Corporate Data from Angry Employees

Yesterday, I defined the problem … employees, angry, unaware or otherwise dishonest, are a significant threat to your company’s IP. Today we look into how to safeguard the database and other IT assets from internal threats by angry employees.

First up is device control. Why make it easy for an employee on their way out to download confidential files onto a USB stick or other removable media type when access can be controlled at the individual user level?

> Read More

Angry Employees and Your Corporate Data

Beyond the Syrian Electronic Army, Anonymous and other hactivists cracking into databases, there is yet another threat—perhaps even a greater threat—to your corporate information: angry employees.

Did you know that half of employees who left or lost their jobs in the last 12 months kept confidential corporate data? It’s true. And according to a global survey from Symantec,

> Read More

No, Perimeter Protection is Not Dead

Oracle is offering what it calls some “shocking conclusions” about cybersecurity, but will these conclusions cause any shift in emphasis away from the perimeter for the sake of protecting the database?

According to a 110-company Oracle-sponsored survey from IDG Research’s CSO Customer Solutions Group, most IT security resources in today’s enterprise are allocated to protecting network assets,

> Read More

To Layer or Integrate? That is the Question

Indeed, the debate over whether to mix a myriad of tools and technologies to create a bulletproof shield that hackers can’t invade or to take an integrated approach to in-depth defense to combat persistent threats is ongoing. But more cyber security analysts are speaking out about the benefits of integration.

Also known as layered defense,

> Read More

How to Avoid Dangerous Data Breaches While Outsourcing

There’s plenty of talk about security threats from internal employees—but what about the threats associated with outsourcing?

The stats may (or may not) surprise you. Forty-six percent of organizations do not evaluate the security and privacy practices of vendors before sharing sensitive or confidential information, according to a recent study conducted by the Ponemon Institute.

> Read More

New School Cyber Crooks Using Old School Malware Tricks

You can teach old crooks new tricks, but many cyber criminals are discovering that the old tricks are working just fine.

Indeed, recent security headlines feature old school malware attacks, like the MiniDuke. And old school botnets with creative new names are bum rushing the Internet. At the same time, reflective memory injection (RMI) attacks,

> Read More

Managing Security Risks in a Virtual Environment

Before virtualization even became an official buzzword, IT industry watchers began pointing to its security risks. Now that virtualization is mainstream, few will come out and say virtual environments are inherently less secure—but there remains a tendency to deploy virtual servers and virtual desktops insecurely.

Of course, with that tendency comes the potential for security breaches.

> Read More

Getting Creative with Data Privacy Employee Education

Data Privacy Day is right around the corner, opening the door for enterprises to educate employees on keeping data safe and secure. But here’s the challenge: many employees may think they’ve heard it all before—and others aren’t particularly concerned despite the billions of dollars lost to data theft each year.

What’s a concerned employer to do?

> Read More