
When it comes to IT acronyms and technical jargon fly fast and free. We’re always looking for a new way to name things, it seems. Shadow IT. Shadow Data. IoT. Shadow IoT. Security of Things. The desire for clarity through naming conventions can overshadow the message. When it comes down to it, most of the conversations are actually the same. It’s about data security. And it’s also about reputation management....
READ MORE
With 2016 nearly behind us already, we’re starting to see some patterns in data breach trends that are rather concerning. One such pattern has been the consistent increase in data breaches affecting the education sector, up 39.6% over the same time period in 2015. The education sector has seen the largest percentage growth in data breaches in 2016 so far, followed by businesses and medical / healthcare organizations. Breaches...
READ MORE
Security is not a black and white matter: there are vast shades of grey that exist in even the most well-thought out security architectures. APTs, zero-days, exploits, vulnerabilities, IoT threats, and the ever-present threat from an organization’s own users, all pose significant amounts of risk to your assets and the invaluable data stored on them. Not that many years ago, security was seemingly much easier – park a stateful...
READ MORE