IT Security
Exclusives


Exclusives

Combining People and Technology To Illuminate Dark Data

A look at the steps companies can take to mitigate dark data.

Exclusives

Are You Managing a Global Mobile Perimeter 6.6 Billion Devices Strong?

The traditional network perimeter is a thing of the past. Today, anywhere-anytime access to information is the expectation; striking a balance between security and accessibility is the challenge.

Exclusives

Ten Ways Auditing Helps to Improve Security

Regular auditing helps contribute towards a more secure IT environment.

Exclusives

Why Entrepreneurs Should Take Cyber Risk Seriously

Entrepreneurs must strike a balance between innovation and cyber risk management.

Exclusives

Software Defined Perimeter: The Secret Service of TCP/IP Networks

What the world needs to improve in network security is to reverse the natural sequence of TCP/IP.

Exclusives

How to Stay Cyber Secure During the Summer Slowdown

Before heading off on summer vacation, IT workers “feel the heat” of just how valuable their services are, especially because within many companies, this department is traditionally understaffed and security resources are often constrained.

Exclusives

Data at Rest Encryption – Only One Part of a Data Security Solution

The explosive growth of mission-critical enterprise and cloud data repositories has made the need to review and upgrade cyber defenses one of the IT community’s highest priorities.

Exclusives

CISOs: Your Employees Aren’t as Dumb as You Think

by Eyal Benishti We all believe that we’re the weakest link. As we’ve come up through the ranks in IT, we were trained to believe that technology is the answer, that technology is the safety net “for human stupidity.” In March 2011, the giant security company RSA was hacked. A spear-phishing e-mail was sent to two small groups within the company. Though the e-mail was automatically marked as junk, the […]

Exclusives

Why Cyber Risk Management Must be Everybody’s Business

by Ryan Stolte Cyber risk management should be like a democracy where many individuals contribute to the effort. Yet, many large companies today expect their CISOs and their security team to do it all, a task that one team cannot achieve alone. Today’s complex enterprise environment consists of thousands of applications and systems, some of which hold the company’s most valuable information, and are governed by line-of-business and application owners […]

WWPI – Covering the best in IT since 1980