Surveys & Reports

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce augue justo, viverra at luctus vitae, dapibus eu odio. Morbi vestibulum orci neque, vulputate pharetra purus fringilla in.

Cracks in Your CyberSec Foundation? How to Secure Any Layered Security Model with the Right Foundation
Cracks in Your CyberSec Foundation? How to Secure Any Layered Security Model with the Right Foundation

Security is not a black and white matter: there are vast shades of grey that exist in even the most well-thought out security architectures. APTs, zero-days, exploits, vulnerabilities, IoT threats, and the ever-present threat from an organization’s own users, all pose significant amounts of risk to your assets and the invaluable data stored on them. Not that many years ago, security was seemingly much easier – park a stateful...

READ MORE
State CIOs Can Take a Leadership Role in Data Security
State CIOs Can Take a Leadership Role in Data Security

The role of Chief Information Officers (CIOs) at the state level of government is changing. As the responsibility of IT purchasing shifts to business units and end users, CIOs are having to juggle new technology demands, opportunities and risks.

READ MORE
NIST Releases Draft Guide on Mobile Security Threats
NIST Releases Draft Guide on Mobile Security Threats

NIST has released a draft report and guide on the security vulnerabilities associated with endpoint devices. Along with this guide, NIST has opened its draft mobile security threats catalogue for public comment.

READ MORE
Why Visibility is Vital to Data Protection
Why Visibility is Vital to Data Protection

Visibility continues to be one of the top areas of concern in data protection. In the Intel Security 2016 Data Protection Benchmark Study, data loss incidents were shown to spike with the increased use of endpoint devices that remain, for the most part, unprotected.

READ MORE
How to Create a Data Security and Control Framework
How to Create a Data Security and Control Framework

Data is the lifeblood of today’s digital businesses. Protecting corporate data from theft, misuse, and abuse is the top responsibility of every Security and Risk (S&R) leader, notes Forrester's Data Security and Privacy report.

READ MORE