A new survey from IDG Research Services tells the story: most organizations lack confidence in the ability of their security defenses to keep them safe. In fact, more than half said 100% security is a pipe dream. This summary by Network World lays out the facts but also presents an approach to detect malware and...
When IT professionals think about information security, they often think about network intrusion detection systems (IDS) and intrusion protection systems (IPS) early in the process. Network IDS/IPS has long been a mainstay for detecting malicious activity and continues to be a very important piece of the security...
Attackers are bypassing conventional security deployments almost at will, breaching systems in a wide swath of industries and geographies. That's the stark conclusion of new data gathered by more than 1,600 FireEye network and email sensors deployed in real-world networks. Following up on our May 2014 report,...
The numbers are staggering. Security alerts come in by the thousands every month, and you and your IT team are tasked with handling each one. Even when alerts are caught and categorized correctly, the sheer volume is overwhelming. And when they're not responded to quickly, the consequences can be disastrous.
In...
As the technology landscape evolves and attackers continue to adapt, we're going to see new vulnerabilities to mobile, new operating systems and the cloud - and new ways for attackers to exploit these weaknesses.
Download this whitepaper to learn:
Technical predictions for the upcoming year;
Business...
What proportion of email threats could be blocked by DMARC? With wide-ranging promises being made as to DMARC's effectiveness, our curiosity led us to perform a detailed analysis of malicious email campaigns targeting 11 of the top banks in the United States and United Kingdom in order to answer this very question....
Want to protect your hard earned email reputation and brand from phishers and spoofers? Not sure where to start or do you find DMARC implementation confusing and time consuming? The Getting Started with DMARC guide will tell you everything you need to know about DMARC and how to quickly get up and running....
A staggering 1/3 of businesses have experienced lost or stolen staff mobile devices and, of those, 1/4 have lost data as a result.
With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints...
All organizations with an on-line presence need to quickly and efficiently detect hackers and fraudsters. However, to avoid frustrating the very people you want to feel welcome, it's critical that authentication processes be as simple as possible.
The newest generation of authentication technology utilizes shared...
As mobile threats have evolved, so has mobile security. What used to be the benchmark - mobile device management - today is merely the baseline. While organizations today develop mobile security maturity, they enhance not just device security, but also content, application and transaction security. Where does your...
As mobile threats have evolved, so has mobile security. What used to be the benchmark - mobile device management - today is merely the baseline. While organizations today develop mobile security maturity, they enhance not just device security, but also content, application and transaction security. Where does your...
The threat landscape has evolved, but security investments have largely remained the same. A disproportionate percentage of budgets are spent on prevention, yet targeted attacks
and advanced threats can easily evade these controls.
Read the Q&A transcript featuring Damballa CTO Brian Foster. Discussion topics...
Public Key Infrastructure (PKI) enables users to securely and privately exchange data shared through a trusted authority. Although it has been around for years, it has recently come back into the spotlight with Gartner's
research entitled "PKI's New Lease on Life in Mobility and the Internet of Things." The value of...
Global enterprises long ago discovered the business benefits of mobility, and now sophisticated criminals are moving into the space with a broad range of new threats. How prepared are you to defend your organization's data? Can the technology you deploy today evolve with the threats awaiting you tomorrow? Do you know...
Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime Study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continues to rise. But there is good...