Sign up | Login with →

Security

exclusive

3 Lessons for enterprise Businesses After Yahoo's Admission of a Massive Data Breach

January 11, 2017 by Sean Mallon

Yahoo! faced a myriad of scandals during 2016. The company is facing a lawsuit after CEO Marissa Mayer was accused of illegally terminating male employees. However, the biggest problem the company faced was a recent data breach.What can other large organizations learn from this fiasco?Background of Yahoo!’s Data BreachThe Yahoo data...[read more]

Expert: Most enterprise data breaches avoidable

December 29, 2016 by CIO Dive

Many cyber security failures can be traced back to sloppiness on the part of the company.[read more]

Report: Social network data theft a leading cybersecurity concern in 2017

December 23, 2016 by CIO Dive

Leaks of personal data collected by technology companies and online services will be among the major cybersecurity threats of 2017, according to a new study from Kaspersky Lab[read more]

exclusive

Hackers Slip into Networks During High Traffic Times: Here’s How to Stop Them

December 22, 2016 by Marc Sollars

Threats are burrowing inside company networks every time the network is busy. Peak demand events, like stores’ sales and Holiday shopping, give criminals cover to introduce malware onto networks – or carry out exploits such as harvesting consumers’ personal details using malware dropped on the network months before.[read more]

Globalization, Cloud and Mobility Change Network Needs

December 21, 2016 by Ofir Agasi

Although cloud migration is rampant in enterprises right now, it may take a while for organizations to migrate networks to the cloud. Many companies rely on highly complex, layered networking solutions that represent substantial monetary and time investments. However, the next time your organization re-evaluates its networking approach, consider the unique advantages the cloud can offer.[read more]

Yahoo reveals another hack impacting 1B user accounts

December 15, 2016 by CIO Dive

Yahoo revealed Wednesday the company suffered a separate data breach in August 2013, compromising the data of more than one billion user accounts.[read more]

IIoT Benefits & Security Considerations for Sensor-2-Server

November 30, 2016 by Scott Allen

SCADA will likely always have value for industrial communications but, going forward, there will be an increase in the use other technologies as well. Additionally, with more technology physically in the field, there is always going to be a focus on data security.[read more]

One-third of shadow IT services present significant risk to the enterprise

November 21, 2016 by CIO Dive

Dive Brief:More than half (61%) of large enterprises now have a cloud governance policy in place to help control shadow IT, according to a new report from Sky High Networks. The company examined data for more than 30 million users worldwide for the report. Among the organizations with a policy in place, Sky High found only 5.4% of...[read more]

Even after Dyn DDoS attack, businesses shouldn't ditch DNS providers, analyst says

November 3, 2016 by CIO Dive

Dive Brief:Businesses should not dump their DNS service providers simply because of the massive DDoS attack on Dyn last month, says Gartner analyst Bob Gill in an interview with CIO. Instead, Gill suggests businesses concerned about DDoS attacks ensure their critical websites rely on more than one DNS provider.The...[read more]

Massive DDoS attack spotlights internet choke point

October 25, 2016 by CIO Dive

Friday's mass DDoS attack against a DNS provider spotlights a long-standing weakness in how traffic moves across the internet. Internet services were interrupted several times Friday following a mass DDoS attack that caused disruptions of Netflix, Twitter, Spotify, SoundCloud, GitHub and Reddit, to name a few.Both the...[read more]

exclusive

Debunking the Top Ten Myths of Cloud Based Disaster Recovery

October 14, 2016 by Gunjan Tripathi

Introduction:Few IT or business professionals would argue over the value of a well-constructed disaster recovery plan, with so many businesses and organizations depend on data systems for their most basic business functions. Savvy business owners know that it is no longer only a matter of protecting your data, but also of saving your...[read more]

AT&T to use AWS network to deliver IoT, analytics

October 11, 2016 by CIO Dive

AT&T announced it will partner with Amazon Web Services (AWS) to let joint customers use AWS cloud services with the AT&T network.[read more]

exclusive

How the Ad Block Debate Impacts Net Neutrality

October 6, 2016 by Ioana Sima

The ongoing debate surrounding ad blocking might never die. Its impact can be felt by the billions of internet users, all of which have been hit by unwanted ads at least once. But at the same time, millions of other companies have their ads unseen. As end users, we may think of ad blockers as sources of power, a tool to use in order to...[read more]

Is Shadow IT Still Lurking Inside Your Organization?

September 14, 2016 by Ofir Agasi

Many file-sharing applications, such as Dropbox and Google Docs, have adapted to accommodate business needs, but few meet the security, privacy or regulatory demands faced by organizations.[read more]

5 Advantages of Using Encryption Technology for Data Protection

September 12, 2016 by Ryan Ayers

Data breach and mega attacks are on the rise and at an all time high. With recent advancements developing in encryption technology, hackers are having are harder time breaking into sensitive data. This article overlooks five advantages of encryption technology and how it can protect confidential information.[read more]