IT Security
Exclusives


Exclusives

Defending Against Insider Threats

Like many other attack methods, a layered defense is the most effective way to combat insider threats.

Exclusives

A Decade of DDoS Education: What’s Changed and What’s Stayed the Same

The majority of DDoS education today has shifted from learning about the attack methods themselves to the correct defense techniques and processes.

Exclusives

Insider Threats 101: How To Detect and Minimize Risks from Within

There is still a lot of educating left to do about the serious risks insiders can pose and as well as the best ways to defend against them.

Exclusives

Four Ways Mobile Device Management Can Protect Your Mobile Workforce from Ransomware Attacks

Mobile Device Management (MDM) is the only way to prevent an organization’s mobile workforce from falling prey to the latest schemes and malware attacks.

Exclusives

Cyber Security State of the Union – Are We Better Off?

If each news-grabbing data breach headline is a wake-up call, then most companies are in a deep asleep.

Exclusives

Combating File Sharing Data Leakage: Part Two

It is a matter of when— not if—a material file data leakage incident will occur in your organization.

Exclusives

Drivetime vs. Runtime: Applying Motor Vehicle Safety to Application Security

Runtime application self-protection, or RASP, a term coined by research firm Gartner, Inc., is the cyber equivalent of seat belts.

Exclusives

Combating File Sharing Data Leakage

The threat of file data leakage and actual incidents not only adds reputation risk but introduces compliance liabilities ranging from fines and loss of business transactions to possible imprisonment.

Exclusives

Combining People and Technology To Illuminate Dark Data

A look at the steps companies can take to mitigate dark data.

WWPI – Covering the best in IT since 1980