• image
  • image
  • image
  • image
  • image
  • image

Do You Know What Apps Your Employees Use?

by Deborah Gage | October 27, 2014 | online.wsj.com

Companies Try to Balance Workers’ Needs With Data Security

Read more: Do You Know What Apps Your Employees Use?

4 ID Management Tips For Better Breach Resistance

by Ericka Chickowski | October 13, 2014 | darkreading.com

AT&T insider attack case highlights the need for strong privileged identity management practices.

Read more: 4 ID Management Tips For Better Breach Resistance

Managing Supply Chain Risk Takes a Collaborative Effort

by Marty Passmore | October 14, 2014 | securityinfowatch.com

With a mixture of technology, joint business initiatives and law enforcement partners, retailers battle cargo thieves

Read more: Managing Supply Chain Risk Takes a Collaborative Effort

In Search of Security Metrics

by Peter E. Ohlhausen | October 14, 2014 | securitymanagement.com

At a major insurance company headquartered in the Midwestern United States, the assistant vice president for corporate security has used an environmental risk metric for the past 12 years to help the company decide where to place office facilities around the country.

Read more: In Search of Security Metrics

Is the open floor plan trend a data security headache?

by Larry Ponemon | August 25, 2014 | csoonline.com

Open-office floor plans have become an increasingly popular option for businesses, but the risks they present may outweigh the benefits

Read more: Is the open floor plan trend a data security headache?

4 Hurdles To Securing The Internet Of Things

by Kelly Jackson Higgins | September 4, 2014 | darkreading.com

Security is hard enough to master in the traditional enterprise network. Now add all types of devices on the Internet of Things, great (think cars) and small (think webcams and baby monitors), which were never built with cyber security in mind.

Read more: 4 Hurdles To Securing The Internet Of Things

Email Security Still a Struggle for Most Companies

by Jen A. Miller | September 3, 2014 | cio.com

Banks and social media firms have taken steps to protect their customers from email scams, according to recent research. However, the travel and healthcare industries remain vulnerable. All the more troubling: Spam and phishing show no signs of going away.

Read more: Email Security Still a Struggle for Most Companies

Tor, a Service for Protecting Identity, Says Network Breached

by Danny Yadron | July 30, 2014 | blogs.wsj.com

Tor, a service used to cloak the identity of Internet users, says outsiders breached its network and tried to learn the identities of some users earlier this year.

Read more: Tor, a Service for Protecting Identity, Says Network Breached