Tag Archive for: Cybersecurity

Regulatory Penalties Increase Data Protection Concerns

By Fran Howarth

Enterprises must develop data protection approaches that enable greater data availability, better reporting capabilities and more robust services levels. Read More

By Fran Howarth
Freelance Writer

August 21, 2017

Support Cybersecurity Efforts With Resiliency Planning

By Fran Howarth

Effective cybersecurity requires businesses to establish a proactive, integrated resiliency plan. Read More

By Fran Howarth
Freelance Writer

August 18, 2017

Q2 2017 Marks the Most Active Quarter for Cybercrime, Study Finds

By Jeff Bertolucci

Cybercrime shows no sign of slowing down, according to a new ThreatMetrix report. Read More

By Jeff Bertolucci
News Writer

August 16, 2017

ICS and IoT Are the Most Prone to Vulnerabilities, Study Reveals

By Kelley Katsanos

Industrial control systems and IoT are the most likely have undiscovered vulnerabilities due to immature development processes, new analysis suggests. Read More

By Kelley Katsanos
News Writer

August 15, 2017

Building Security Into the Application Development Process

By Fran Howarth

Building security controls into the application development process is more cost-effective than fixing bugs once the software is in use. Read More

By Fran Howarth
Freelance Writer

August 15, 2017

Security Experts Predict AI Will Change Cyberthreat Landscape

By Jacqueline Lee

Artificial intelligence may be weaponized in cyberattacks, and there's no better tool to defend against these threats than AI itself. Read More

By Jacqueline Lee
Freelance Writer

August 3, 2017

Big Win for Cybersecurity as Petya’s Code Gets Cracked

By Joe Hewitson

In a major cybersecurity win, decryption tools have unlocked the mysteries behind Petya. Read More

By Joe Hewitson
News Writer

July 27, 2017

Identity Access Management: Who Holds the Keys to Your Data?

By Juliet Grout

Identity access management determines which individuals within an organization have access to certain applications, network shares and data. Read More

By Juliet Grout
Security Manager, IBM

July 27, 2017

Despite Cost, Organizations Prefer to Store Data in the Cloud

By Jacqueline Lee

Businesses prefer to store data in the cloud instead of on-premises, but they don't always understand their own security responsibilities. Read More

By Jacqueline Lee
Freelance Writer

July 26, 2017

Telecom Companies Must Prioritize Cybersecurity in Data Management

By Albert McKeon

Cybersecurity needs to become a top data management priority if telecommunication companies want to stay ahead of threats. Read More

By Albert McKeon
Freelance Writer

July 17, 2017