Understanding Today’s Cyber-Security Threats

Over the past few years, digital technologies have rippled through the business world and unleashed unprecedented innovation and disruption. Yet today’s technology framework also has put businesses in the crosshairs and created new levels of risk.No longer are cyber-threats thwarted by clearly defined perimeters such as firewalls. No longer are malware and cyber-attacks blocked by[…]

CompTIA shows how tech continues to shape the world 

Paced by anticipated customer demand for emerging technology, services and software, information technology (IT) industry executives enter 2017 with a positive outlook, according to the IT Industry Outlook 2017 released by CompTIA, a technology association. Their “consensus forecast” projects global industry growth of 4.1 percent in 2017. “With the groundwork of cloud, mobility, data and[…]

Digital transformation forces businesses to rethink cybersecurity 

Seeking to maintain competitive advantage, gain market share and satisfy evolving customer demands, businesses around the globe are pursuing digital transformation. And that digital transformation is forcing reevaluation of cybersecurity strategies, according to a new study by BMC and Forbes Insights.One of the more significant changes, says Brian Downey, senior director of Product Management, Security[…]

Cyber ‘Smear’: Hackers Publish Olympians’ Medical Records 

In what a U.S. official said was a “smear” attack on American Olympians, hackers have posted online medical and drug testing records for top athletes including gymnast Simone Biles, tennis players Serena and Venus Williams and basketball player Elena Delle Donne.The World Anti-Doping Agency (WADA) announced online today that hackers, who were previously linked to[…]

Much ado about the ransomware scourge 

The Federal Trade Commission said it will hold a public workshop about all things ransomware on Sept. 7.“With alarming frequency, ransomware hackers are sneaking into consumer and business computers, encrypting files containing photos, documents and other important data, and then demanding a ransom in exchange for the key needed to decrypt the files. Consumers, businesses,[…]

IT leaders share their strategy for creating authenticity 

With technology, it’s becoming harder to remain inauthentic at work, according to Todd Horton, founder and CEO of KangoGift. With the modern culture of sharing, thanks to social media outlets like Facebook, Instagram and Twitter, there’s a sense of openness that might not have existed in companies a decade ago. “For better or worse, the[…]

Your next 10 security pain points

Going to security conferences always stimulates my imagination. It makes me think outside of the box and remove the cruff that develops when I sit inside my lab too long—staring at vCenter monitors, 10 open bash sessions, security consoles, and emails from colleagues swallowing Xanax.9 ways to bend Windows 10 to your willCustomize Windows 10[…]

New HIPAA guidance addresses ransomware 

The U.S. Department of Human Services has released new guidance for health care organizations that focuses on the growing threat of ransomware, stresses the need for better education and regular backups, and confirms that a ransomware attack against plain-text health information is, in fact, a breach that must be disclosed.9 ways to bend Windows 10[…]

Why a security team embraces shadow IT 

When you hear the phrase “getting ahead of shadow IT,” it typically comes from a CIO who is implementing new technologies so that employs won’t take it upon themselves to purchase tools. But you don’t expect such proactive practices from an enterprise’s information security team, which a CIO often enlists to place a moat around[…]

Ponemon: Cloud Adoption Grows as Security Lags

Cloud adoption is growing, but companies aren’t taking security into account the way they should. A fresh Ponemon Institute survey shows that many businesses simply aren’t adopting appropriate governance and security measures to protect sensitive data in the cloud.The results show that 73% of respondents deem cloud-based services and platforms important to their organization’s operations,[…]