In the last few years, companies both in the United States and abroad have witnessed the steady growth of cyberattacks and corporate espionage. The financial losses
and, worse, often irreparable reputational harm such incidents wreak have served to place a target squarely on the backs of board members to ensure they...
Today's business environment is fraught with risk. Economic, technology and market conditions affect organizations on a daily basis. The constantly changing "risk landscape" is a discussion point in headlines, industry forums, media outlets and board rooms - the disappearing perimeter to defend, the hackers, thieves...
Every organizational unit has some level of risk it must address. Yet, most internal teams lack the ability to identify priorities and accountability to stay ahead of new threats to the business thus leaving the process of managing risk to be more reactive. While many risks exist within each function, there is often...
In the last few years, companies both in the United States and abroad have witnessed the steady growth of cyberattacks and corporate espionage. The financial losses
and, worse, often irreparable reputational harm such incidents wreak have served to place a target squarely on the backs of board members to ensure they...
Today's business environment is fraught with risk. Economic, technology and market conditions affect organizations on a daily basis. The constantly changing "risk landscape" is a discussion point in headlines, industry forums, media outlets and board rooms - the disappearing perimeter to defend, the hackers, thieves...
You can't open your email without hearing about the latest public security incident and data breach. The advancing techniques of attackers and sophisticated malware makes it harder and harder to stay ahead of threats. We all know we need protection against advanced threats. We all know we need to be ready to...
The FFIEC warns U.S. financial institutions that they're at increased risk from attacks that are designed to harvest large amounts of credentials, as well as from destructive "wiper" malware attacks.
Premera Blue Cross already is facing five class action lawsuits in the wake of its massive data breach. Meanwhile, its CEO has provided some answers to questions posed by a U.S. senator regarding the hacker attack.
To help protect against the latest advanced threats, many organizations have opted to augment their traditional perimeter defenses (firewalls and anti-virus tools) with point solutions focused on threat detection. But these point solutions often target a single threat vector, leaving the organization exposed to other...
Just when you thought it was safe to go mobile, everything is different.
The risks are different. Only a few years ago, predictions stated that smartphones and tablets had little vulnerability to malware and hacking. But in the one-year period ending March 2013, malware aimed at mobile platforms grew 614 percent,...
Imagine an organization with no single place to find employee information across business units. Communications and collaboration would suffer. But an information portal would enable enterprise-wide searches and easy updates for basic information such as phone numbers. Or consider recently merged organizations. To...
Combatting advanced cyberthreats grows more challenging every day. With up to a third of enterprise Internet traffic now being encrypted, cybercriminals are cloaking their attacks within Secure Sockets Layer (SSL) traffic, knowing very well that perimeter security devices are blind to their exploits. But even if all...
Network encryption is a security best practice as it protects the privacy and confidentiality of network traffic as it travels from source to destination. While this can be beneficial, security professionals understand that network encryption can also be used for malicious purposes. Cyber-criminals and hackers can...
The cloud and mobility are disrupting the way IT builds and delivers value for organizations. Perhaps you are moving computing workloads to the cloud and storing an increasing amount of data outside the corporate perimeter, or maybe an increasing proportion of employees now access data from outside your corporate...
Slack Technologies, a tech start-up that offers a group chat tool, announces it's rolling out two-factor authentication after hackers breached a database of user profile information.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.