IT Security
Exclusives


Exclusives

Encryption 2016: Are You the Keymaster?

by Jason Hart In 2015, encryption rose even higher in the public consciousness, fueled in equal parts by huge data breaches, privacy fears, and government clashes with the tech industry over the issue. The FBI expressed concern that broad use of the technology could hinder law enforcement, while technology companies demanded the ability for customers to keep their data completely private and secure. Just this past month, an online petition […]

Exclusives

Security Aspects of AIM

by Gene Malone Network and information security is a priority for most organizations, especially government agencies, financial institutions, and healthcare organizations. Automated Infrastructure Management (AIM) systems provide heightened awareness and security around what goes on in the network by showing, in real time, what is connected and disconnected where. In this article, we’ll look at the security aspects of AIM solutions, including how they heighten security awareness, and how these […]

Exclusives

Security Aspects of AIM

by Gene Malone Network and information security is a priority for most organizations, especially government agencies, financial institutions, and healthcare organizations. Automated Infrastructure Management (AIM) systems provide heightened awareness and security around what goes on in the network by showing, in real time, what is connected and disconnected where. In this article, we’ll look at the security aspects of AIM solutions, including how they heighten security awareness, and how these […]

Exclusives

Cybersecurity 2016: Four Threats on the Horizon

by Salo Fajer Following a year filled with sophisticated data breaches and headline-grabbing cyberattacks hitting nearly every industry, it’s safe to say most businesses are welcoming 2016 with open arms. The past year proved that cyber threats are only increasing in regularity and complexity, as hackers demonstrated using sensitive stolen data in creative and frightening ways. In fact, in 2015, more than 178 million records on Americans were exposed in […]

Exclusives

How to Reduce Insider Threats with Continuous Risk Monitoring

by Raj Ananthanpillai Does your company have the right tools to protect against a devastating insider attack? For most, the answer is no. Insider threats are malicious threats to an organization perpetrated by people within the organization, such as employees, former employees, contractors or business associates. A recent report found that less than half of companies have the proper tools to fight these threats. The number of insider threat attacks, […]

Exclusives

Better Off Alone? Isolation Strategies To Help Defy Breaches

by Franklyn Jones Enterprise boundaries are increasingly permeable, and the pressure on IT and security teams to contain them is escalating with every major breach and ensuing news cycle. Organizations continue to fall victim to clever threats such as targeted APTs that defy detection, highly weaponized malware and sophisticated zero-day attacks. They’re equally at risk from pervasive and seemingly obvious phishing, malvertising and other mass-scale, indiscriminate contagions, triggered by the […]

Exclusives

A Brave, New Cybersecurity World: Evaluating Trust Before Allowing Connectivity

by Mark Hoover We all know that TCP/IP-based networking has proven to be hugely scalable and flexible.  There are several reasons for that.  One is the separation of responsibility between the network layer (IP) and the connection layer (usually TCP, sometimes UDP).  The network layer focuses on efficiently moving packets from point A to point B on a large scale.  The connection layer focuses on establishing and optimizing data transfer […]

Exclusives

Focus on Five Areas of IT Security For Computer Security Day,

by Nathan Wenzler From T-Mobile to Ashley Madison, CVS and BlueCross BlueShield, no industry was safe from massive cyber attacks in 2015. While some IT admins read the latest data theft headlines and feel all-but-resigned to their company one day suffering from an attack, they should instead take the time to learn from these breaches and adjust their security strategies accordingly. When examining the standard chain of a cyberattack, user […]

Exclusives

How to Win the Cyberwar

by Anne Bonaparte There is no doubt about it. We’re in a cyberwar and the bad guys are winning. Cybercrime set new records in 2014, with hack attacks up 55 percent from the previous year, according to CSO magazine’s “State of the CSO” survey. And 2015 is on track to be even worse. In fact, Symantec says companies with more than 2,500 employees now have a 1 in 2.3 chance of […]

WWPI – Covering the best in IT since 1980