The Rise and Risk of BYOD (INFOGRAPHIC)
The BYOD trend presents its own concerns when it comes to protecting confidential workplace data. As the trend continues to…
How to Ensure Protection of Critical Business Data
Hackers and digital scam artists who make a living out of stealing sensitive business related information from corporate computers have…
Employee Training and Other Ways to Protect Your Company’s Valuable Data
In the last decade, companies have seen new business opportunities thanks to the advancement in technology. However, these technologies can…
Secure Video Conferencing
With so many video conferencing options available, it can be difficult to decide on the right solution for your enterprise.…
5 Questions to Ask as You Prepare for a Compliance Audit
For most cloud service providers, a compliance audit is, at best, a necessary evil — the root canal of the…
Why Returning $1 Trillion to Shareholders is a Bad Idea
According to the Financial Times, companies are on record pace to return over one trillion dollars to shareholders this year…
IBM Opens Up Its Threat Data as Part of New Security Intelligence Sharing Platform
IBM has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public…
Malicious Tool Provides Attackers with a New Type of Zombies
An interesting concept which has really emerged only lately - IoT, or: “the Internet of Things”, has recently been in…
How to Clean Up the Mess: Surviving a Data Breach
Here’s a scary thought: Nearly half (43%) of all companies experienced a data breach last year, most of which took…
Facebook’s ThreatExchange to Help Cyber Security Experts Coordinate Their Efforts Against Hackers
Hackers continue to target companies throughout the United States with cyber attacks. In 2014, cyber attacks hit a rapid pace…