IT Security
Exclusives


Exclusives

Fast Security Response Requires Traffic Visibility

We don’t have cybersecurity police that we can call. We are on our own. This is why CSOs need a system in place that aids their ability and responsibility to react fast.

Exclusives

Defending Against Insider Threats

Like many other attack methods, a layered defense is the most effective way to combat insider threats.

Exclusives

A Decade of DDoS Education: What’s Changed and What’s Stayed the Same

The majority of DDoS education today has shifted from learning about the attack methods themselves to the correct defense techniques and processes.

Exclusives

Insider Threats 101: How To Detect and Minimize Risks from Within

There is still a lot of educating left to do about the serious risks insiders can pose and as well as the best ways to defend against them.

Exclusives

Four Ways Mobile Device Management Can Protect Your Mobile Workforce from Ransomware Attacks

Mobile Device Management (MDM) is the only way to prevent an organization’s mobile workforce from falling prey to the latest schemes and malware attacks.

Exclusives

Cyber Security State of the Union – Are We Better Off?

If each news-grabbing data breach headline is a wake-up call, then most companies are in a deep asleep.

Exclusives

Combating File Sharing Data Leakage: Part Two

It is a matter of when— not if—a material file data leakage incident will occur in your organization.

Exclusives

Drivetime vs. Runtime: Applying Motor Vehicle Safety to Application Security

Runtime application self-protection, or RASP, a term coined by research firm Gartner, Inc., is the cyber equivalent of seat belts.

Exclusives

Combating File Sharing Data Leakage

The threat of file data leakage and actual incidents not only adds reputation risk but introduces compliance liabilities ranging from fines and loss of business transactions to possible imprisonment.

WWPI – Covering the best in IT since 1980