Do You Know What Apps Your Employees Use?
by Deborah Gage | October 27, 2014 | online.wsj.com
Companies Try to Balance Workers’ Needs With Data Security
4 ID Management Tips For Better Breach Resistance
by Ericka Chickowski | October 13, 2014 | darkreading.com
AT&T insider attack case highlights the need for strong privileged identity management practices.
Managing Supply Chain Risk Takes a Collaborative Effort
by Marty Passmore | October 14, 2014 | securityinfowatch.com
With a mixture of technology, joint business initiatives and law enforcement partners, retailers battle cargo thieves
In Search of Security Metrics
by Peter E. Ohlhausen | October 14, 2014 | securitymanagement.com
At a major insurance company headquartered in the Midwestern United States, the assistant vice president for corporate security has used an environmental risk metric for the past 12 years to help the company decide where to place office facilities around the country.
Is the open floor plan trend a data security headache?
by Larry Ponemon | August 25, 2014 | csoonline.com
Open-office floor plans have become an increasingly popular option for businesses, but the risks they present may outweigh the benefits
4 Hurdles To Securing The Internet Of Things
by Kelly Jackson Higgins | September 4, 2014 | darkreading.com
Security is hard enough to master in the traditional enterprise network. Now add all types of devices on the Internet of Things, great (think cars) and small (think webcams and baby monitors), which were never built with cyber security in mind.
Email Security Still a Struggle for Most Companies
by Jen A. Miller | September 3, 2014 | cio.com
Banks and social media firms have taken steps to protect their customers from email scams, according to recent research. However, the travel and healthcare industries remain vulnerable. All the more troubling: Spam and phishing show no signs of going away.
Tor, a Service for Protecting Identity, Says Network Breached
by Danny Yadron | July 30, 2014 | blogs.wsj.com
Tor, a service used to cloak the identity of Internet users, says outsiders breached its network and tried to learn the identities of some users earlier this year.