User expectations of technology have been changing rapidly over the past few years, as consumer technologies and services have raised the bar for service availability, user friendliness, and device independence. Access to information and data is at the core of this trend, with users wanting to access their data...
Organizations are demanding higher levels of system and network availability, and cost effective business continuity. However, all this must be managed and maintained by a single department with one IT budget. This often leads to the creation of tensions between conflicting demands and priorities of production...
As computing becomes borderless, adversaries are increasingly bypassing perimeter security and taking advantage of vulnerabilities brought on by the growing number of applications and their unsecured entry points. At the same time, business managers are dramatically increasing the rate of deployment of often rushed to...
With a spate of recent breaches taking place at well-known companies including Target, Home Depot and Sony, organizations must reevaluate the security of the code running within the enterprise. Leaving flawed code in place almost invites hackers in to the company's network. While most companies try to secure the...
Home security and remote monitoring systems are a major application of the Internet of Things (IoT). Most include sensors, motion detectors, video cameras, and recorders all connected via the cloud to a mobile device or the web. But are they and IoT applications in general secure from hackers? This research study...
There is no question that mobile computing is growing at an exponential rate. It's been a remarkable and rapid transformation that much like the advent of the web has left security concerns outpaced by the ease of use and flexibility of a new tool. When vulnerabilities are exploited, the security of mission-critical...
Open source software is a game-changer in helping development organizations herd their application security risks. But it can also introduce risk when employed without adequate precautions. Recent evidence suggests that the presence of application vulnerabilities in open source software is a far more pervasive...
The weakest point in modern networking infrastructures is often not the low-level hardware and software running on the servers, but the web applications that are developed and hosted upon them. According to the SANS survey on application security, poor understanding of web security needs on the part of developers...
Understanding technical security risk begins with knowing how and where vulnerabilities occur within an organization. These vulnerabilities are the gateway that malicious actors use to circumvent security protections and steal or alter data, deny access, and compromise critical business processes. The processes that...
RSA Conference 2015 may have been the largest in the history of the event. And, no doubt, Information Security Media Group had its largest presence ever.
As the sole Diamond Media Sponsor of RSA Conference 2015, ISMG was prominent in event promotion, and we were an even larger presence at the show.
In our...
97% of Financial Services respondents report being somewhat or more vulnerable to insider threats. This Research Brief highlights the results collected online by Harris Poll from 102 IT decision makers in U.S. financial services enterprises in the Fall of 2014. U.S. results are compared, where applicable, to findings...
Healthcare data (Personal Health Information [PHI] and other personal data held by healthcare organizations) has become one of the most desirable commodities for sale on "black" Internet sites, and for good reason. Healthcare records typically contain enough detail to not only apply for credit cards or loans, but can...
In the past, insider threats resulted mainly from employees with access to financial data or other secret and sensitive information. That's no longer the case today. Today, employees with legitimate access, service providers or contractors that maintain infrastructure and privileged users are all possible actors, and...
In the past few years, Vormetric has been busy showing the world that it's no longer just your father's file and database encryption vendor. Since the launch of its Vormetric Data Security platform strategy in early 2014, the company has been hard at work extending the platform's capabilities with new features and...
Companies are increasingly reliant on storing sensitive data in cloud storage, which could be vulnerable to security threats and violate compliance requirements. At the same time, data breaches continue to grow more prevalent and costly. The Vormetric Cloud Encryption Gateway is a scalable solution that provides...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.