By Andy Patrizio Cloud computing comes with its own security issues, and research suggests that IT leaders are thinking about it the wrong way. Too often, businesses are concerned with an external threat exploiting cloud vulnerabilities when the greater threat can be found among a company’s own end users.
Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.
By Michael Kassner The Federal Trade Commission (FTC) has been working to secure the sensitive information of consumers, and their experience has many lessons for IT leaders and cybersecurity professionals. The Commission has released a new guide to help businesses with their data security.
By Orin Kerr Privacy and cybersecurity—and where the two intersect—have been hot topics in technology news lately. One particular piece of legislation, signed into law along with the government funding bill late last year, has drawn scrutiny over its privacy implications. But what’s actually in the Cybersecurity Act of 2015?
By Laura Hautala Holding an organization’s files hostage has become a go-to, profitable attack for cybercriminals. While there’s no surefire way to keep your company from becoming the latest victim, there are steps you can take other than paying up.
By Brian Barrett It’s become a common practice at many organizations—IT leaders encouraging (if not outright forcing) the company’s workers to change their passwords on a regular basis. There is an argument, however, that this practice accomplishes the opposite of what is intended and creates vulnerabilities in cybersecurity.
By The Naked CIO There’s no question that cybersecurity is critical—just look at our lead-off story today! However, one tech writer cautions business and technology leaders against overlooking other equally important investments into other aspects of IT infrastructure.
by Lucian Constantin As cyberattacks become more sophisticated, one method has become a favorite of some criminals—holding an organization’s data for ransom. Are your company’s data safe? Be sure to take precautions to avoid this costly threat.
by Taylor Armerding It may seem very appealing to fight fire with fire after a cyberattack, but doing so may only get you into more trouble. A group of experts discussing international economic espionage came to the conclusion that hacking back could result in unintended negative consequences.
Cybersecurity has become a top priority of IT leaders, but it seems that patching vulnerabilities hasn’t caught up when it comes to certain data. Many organizations are securing their customers’ data but have not given the same consideration to protecting data related to their employees.
by David Goldman A big problem with antivirus and antimalware tools is the false sense of security that they provide. A new system from Microsoft aims to alert users and IT departments if a hack occurs—it may seem a little reactive, but isn’t it better to know about the problem so it can be fixed […]