IT Security
Exclusives


Exclusives

Embrace “Responsible Encryption” and Rise Above the Privacy vs. Security Debate

by John Robusto Encryption has never been hotter, with big name brands around the world keen to trumpet their tough stance and protection of customers. Only a few months ago, encryption would have been consigned to the tech or business section – now it’s front page news, with Whatsapp, Apple and Microsoft amongst those making a splash. Thanks to last week’s 60 Minutes segment, Signalling System No. 7 (SS7), a […]

Exclusives

Hacktivism – Are We Powerless to Stop it?

by David Yates Hacktivism, namely using computers to promote a political/social issue, can be seen in much the same light as other more physical forms of protest and often exercised for the same broad array of reasons. As with other forms of protest, the question of justifiability is a complex topic with no simple blanket answer. Hacktivism has taken on many different faces in its short lifespan. From international movements […]

Exclusives

The Role of Administrative Controls in Data Security and Privacy

by Dan Burks Technology is essential, but your security and visual privacy efforts are only as strong as your physical environment and your people The discussion about data security and privacy is often dominated by technology. That’s not a surprise. We’re concerned with the major data breaches that have made headlines in recent years and the vast number of malware and other external threats out there. Fortunately, a number of […]

Exclusives

Identity Management: Security, access and the road ahead

We continue to experience many strides and steps forward in regard to technology advancement, especially as related to identity and access management solutions.

Exclusives

Cybersecurity 2016: Four Threats on the Horizon

by Salo Fajer Following a year filled with sophisticated data breaches and headline-grabbing cyberattacks hitting nearly every industry, it’s safe to say most businesses are welcoming 2016 with open arms. The past year proved that cyber threats are only increasing in regularity and complexity, as hackers demonstrated using sensitive stolen data in creative and frightening ways. In fact, in 2015, more than 178 million records on Americans were exposed in […]

Exclusives

How Vulnerable Is Your SharePoint Farm?

by Dr. Steve Marsh Use this 9-point checklist to measure your SharePoint security policies Are your company’s SharePoint security policies protecting your organization from data leaks due to insider threats? Without undergoing a formal assessment, it can be difficult to know. Yet research from Infosec Europe has shown that most of today’s security spending fails to address these insidious risks, despite the fact that many IT professionals are worried about […]

Exclusives

Keeping up with Today’s Cyber Reality

by Derek Brown Driven by the promise of financial rewards and empowered by the sheer scale and reach of internet-based attacks, organized criminals have secured an increasingly strong foothold online as they refine their skills in large-scale, high-consequence cyber crime – deliberate crime that has a severe or crucial impact on its victims. New Risks Higher consequence crime is rising with nation states and organized criminals continuing to steal IP […]

Exclusives

Encryption 2016: Are You the Keymaster?

by Jason Hart In 2015, encryption rose even higher in the public consciousness, fueled in equal parts by huge data breaches, privacy fears, and government clashes with the tech industry over the issue. The FBI expressed concern that broad use of the technology could hinder law enforcement, while technology companies demanded the ability for customers to keep their data completely private and secure. Just this past month, an online petition […]

Exclusives

Encryption 2016: Are You the Keymaster?

by Jason Hart In 2015, encryption rose even higher in the public consciousness, fueled in equal parts by huge data breaches, privacy fears, and government clashes with the tech industry over the issue. The FBI expressed concern that broad use of the technology could hinder law enforcement, while technology companies demanded the ability for customers to keep their data completely private and secure. Just this past month, an online petition […]

WWPI – Covering the best in IT since 1980