Corporate

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce augue justo, viverra at luctus vitae, dapibus eu odio. Morbi vestibulum orci neque, vulputate pharetra purus fringilla in.

Forrester and Absolute Webinar Feb. 9th: Mastering Endpoint Security

Do You Know Where Your Endpoints Are? Security, risk and IT professionals are dealing with staggering amounts of endpoint-related data loss and exposure. The proliferation of mobile devices, the Cloud and the decentralization of IT / Shadow IT and IoT all amplify the chance that an endpoint will be the source of a data breach. One estimate suggests that, by 2020, the amount of data stored on devices will...

READ MORE
The Yahoo Breach Fallout Could Last for Years
The Yahoo Breach Fallout Could Last for Years

On December 14, 2016, Yahoo posted a Security Notice announcing that over 1 billion Yahoo user accounts were breached in August, 2013. This data breach is separate, although possibly linked, to the September 22, 2016 state-sponsored breach that affected 500 million people. The repercussions of this data breach are wide-reaching and promise to be long-lasting. Yahoo announced that an unauthorized third party breached the data files of 1 billion...

READ MORE
Cloud Storage Set to Surge
Cloud Storage Set to Surge

Cisco recently unveiled its sixth annual Global Cloud Index (2015-2020), a report analyzing and projecting cloud traffic. The report projects that cloud traffic will nearly quadruple by 2020 as consumers and organizations alike migrate to cloud architecture in order to scale quickly and efficiently. Mirroring growth alongside the cloud is the expected increased use of mobile devices as the primary endpoint device for work, as well as a rise...

READ MORE
Federal Report Urges Incoming Administration to Prioritize Cybersecurity
Federal Report Urges Incoming Administration to Prioritize Cybersecurity

The Commission on Enhancing National Cybersecurity established by President Obama recently released a 90-page Report on Securing and Growing the Digital Economy, a report whose explicit purpose was to make recommendations that would strengthen cybersecurity in both the public and private sectors. The report makes specific and excellent recommendations to address urgent cybersecurity challenges, including the obsolescence of the “classic concept of the security perimeter” brought about by mobile...

READ MORE
Cloud Use Exacerbates Alert Fatigue
Cloud Use Exacerbates Alert Fatigue

It has been estimated that 90% of organizations will suffer at least one security incident this year. There is no question that organizations are suffering more data security incidents than ever before and that more of these incidents are translating into data breaches than ever before. While prevention is always important, detection and response are just as important. Research indicates it can take an average of 256 days to...

READ MORE