Data & Device Security

Federal Report Urges Incoming Administration to Prioritize Cybersecurity
Federal Report Urges Incoming Administration to Prioritize Cybersecurity

The Commission on Enhancing National Cybersecurity established by President Obama recently released a 90-page Report on Securing and Growing the Digital Economy, a report whose explicit purpose was to make recommendations that would strengthen cybersecurity in both the public and private sectors. The report makes specific and excellent recommendations to address urgent cybersecurity challenges, including the obsolescence of the “classic concept of the security perimeter” brought about by mobile...

READ MORE
Cloud Use Exacerbates Alert Fatigue
Cloud Use Exacerbates Alert Fatigue

It has been estimated that 90% of organizations will suffer at least one security incident this year. There is no question that organizations are suffering more data security incidents than ever before and that more of these incidents are translating into data breaches than ever before. While prevention is always important, detection and response are just as important. Research indicates it can take an average of 256 days to...

READ MORE
People Continue to Remain Top Cyberthreat
People Continue to Remain Top Cyberthreat

Echoing the findings from the past year, and despite growing media frenzies over cyberattacks and malware, people continue to remain the top cyberthreat to businesses in North America. In North America, the most serious data breaches were attributed to careless / uninformed employee actions in 59% of cases and phishing / social engineering in 56% of cases. According to Business Perception of IT Security, a report from Kaspersky Lab as...

READ MORE
Modern Embedded Endpoint Security with Absolute DDS: IDC Technology Spotlight
Modern Embedded Endpoint Security with Absolute DDS: IDC Technology Spotlight

Enterprise IT teams face an uphill struggle to maintain visibility into and control over corporate resources and to mitigate risks to critical business assets. The ever-growing distributed nature of corporate networks, brought about by Cloud adoption and the proliferation of mobile devices, has increased the complexity over IT situational awareness while also narrowing the field of sight, enabling cybercrime to thrive. In a new Technology Spotlight by market intelligence...

READ MORE
Visibility Key to Thwarting Changing Threat Profile
Visibility Key to Thwarting Changing Threat Profile

Right now, we are on the cusp of major change – the expansion of mobile device options, BYOD, the cloud, and the decentralization of IT. Many of these changes are only in their infancy in terms of their current impact on the corporation. In four years time, the technologies we use and the threats they present will be entirely different. The McAfee Labs 2017 Threats Predictions report explores what...

READ MORE