Articles under the topic  Security

Securing the Next Generation Digital Enterprise: Focus on Innovation

ID-100259303.jpg

Across industries, we are witnessing the transformation of the enterprise information management model. Enterprises must focus on managing risk, while developing new enterprise operating models that optimize investments and enables the business. New opportunities bring new risks, as the model transforms so do the security needs. Typical approaches are insufficient for addressing this array of security challenges. 

Interview: Charles Weaver, CEO of MSPAlliance

CharlesWeaver-MSPAlliance.jpg

Jack Koziol of the InfoSec Institute talks with Charles Weaver, the co-founder and CEO of the MSPAlliance about the work done by the association, the future of managed services and some of the challenges in managed services right now that are being overlooked. According to Weaver, cloud will be playing a more pronounced role in managed services. 

CIOs Take on Target Breach: INFOGRAPHIC

rsz_infographic.jpg

Minneapolis-based Retail Chain giant Target's massive data breach, claimed its highest-profile victim to date (President and CEO Gregg Steinhafel), exactly two months after its CIO Beth Jacob was asked to resign. DynamicCIO.com asked few CIOs on their personal opinion/views on this subject. It is indeed a wakeup call for Chief Executives to create a sense of security culture within a corporation. It certainly is not a blame game. 

Majority of Mobile Security Breaches will be Result of App Misconfiguration

ID-10074764.jpg

By 2017, as many as 75 percent of endpoint-related security breaches will be the result of improper application configuration on mobile devices, as attackers continue to shift their focus towards targeting smartphones and tablets finds a research from Gartner. The most obvious platform compromises of this nature are 'jailbreaking' on iOS or 'rooting' on Android devices.  

Average Enterprise Generates 10,000 Security Events Per Day

ID-100206734.jpg

Research finds that it requires manual analysis to determine if there are early indicators of a compromise of systems. It is daunting for security staff to manually trawl through mountains of alerts in order to discover which (if any) constitute a real and present threat. The findings also sheds light on why recent attacks at organizations like Target were undetected for so long, since alerts don't equal infections. 

Snowden Leaks Preventing Enterprises from Moving to the Cloud:Infographic

NSA-After-Shocks.jpg

Enterprises across the globe are changing their cloud buying behaviour as a direct consequence of the Snowden revelations. A report from NTT Communications has found that businesses are concerned and they are acting decisively to protect their data by keeping it where they know it will be safe. ICT decision-makers want to protect their company's data even if it means delaying cloud computing projects. 

Social Networks and Financial Institutions Top Phishing Bait

ID-10067364.jpg

Phishing operations overwhelmingly choose to impersonate social networks and financial organizations to compromise targets, accounting for more than two-thirds of the "bait" employed by attackers. They are increasingly focusing on bank web services to gain direct access to victim's banking accounts in order to pilfer funds, providing immediate financial gain for the attackers. 

Enterprise Security: A Management Perspective

rsz_2092613_1219_enterprises2.jpg

Stakeholders generally frown on scanning and patching the critical infrastructure. This is because enterprise security teams are considered as a pain to the day to day operations for the rest of the enterprise and also the fact that security management in its real vigor is never atop the priority list for stakeholders. For decades we have witnessed that, only after a breach, an enterprise strengthens its security infrastructure. 

One-Fifth of All Malware Ever was Created in 2013

ID-100206734.jpg

A recently released report that analyzed the development of malicious code indicates that in 2013 as many as 30 million new strains of malware were introduced, an average of about 82,000 new variants each day last year, and accounted for one-fifth of the 145 million malware samples ever created. In addition, the report also takes a look at attacks, vulnerabilities, and trends in cybercrime and hacktivism. 

CISO: Time to Up the Game and Get an Image Makeover

ID-100144438.jpg

Even as CISO becomes a full-blown function, the ground reality is that for most organizations the face of the CISO is still someone planning and managing security systems. As security becomes intrinsically linked with business growth the CISO needs to move out of IT's shadow and get an image makeover as a business leader and custodian of enterprise reputation, risk management, brand promise and trust.  

  • <<
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • Dynamic Newsletter

    Sign up for our newsletter and get news and articles right in your inbox: