The Importance of A Secure Foundation in Nex-Gen Enterprise Security

The Importance of A Secure Foundation in Nex-Gen Enterprise Security

The emergence of Advanced Persistent Threats (APTs), zero-day vulnerability exploits, and the ever-present threat posed by arguably the most dangerous of adversaries, the organization’s own users, continue to poke new holes in even the most well-laid security architectures. While the tools that attempt to keep data and other […]

Government Agencies Lack Security in Public Cloud Deployments

Government Agencies Lack Security in Public Cloud Deployments

Public sector data breaches have been on the rise in 2016, hitting government agencies hard all across the globe. According to the latest breach figures in the US alone, 38% of breached records are attributed to government and military agencies, second only to healthcare for largest numbers of […]

The Yahoo Breach Fallout Could Last for Years

The Yahoo Breach Fallout Could Last for Years

On December 14, 2016, Yahoo posted a Security Notice announcing that over 1 billion Yahoo user accounts were breached in August, 2013. This data breach is separate, although possibly linked, to the September 22, 2016 state-sponsored breach that affected 500 million people. The repercussions of this data breach […]

The Growing Challenges in Combatting Shadow IT

The Growing Challenges in Combatting Shadow IT

Shadow IT is a huge and growing problem. Organizations must find the right balance of policy, processes and supporting technologies in order to regain visibility into the endpoint and the cloud where data is living in the ‘Shadow,’ all without becoming overtly restrictive and re-enforcing the negative-yet-well-meaning behavior […]

Cloud Storage Set to Surge

Cloud Storage Set to Surge

Cisco recently unveiled its sixth annual Global Cloud Index (2015-2020), a report analyzing and projecting cloud traffic. The report projects that cloud traffic will nearly quadruple by 2020 as consumers and organizations alike migrate to cloud architecture in order to scale quickly and efficiently. Mirroring growth alongside the […]

Federal Report Urges Incoming Administration to Prioritize Cybersecurity

Federal Report Urges Incoming Administration to Prioritize Cybersecurity

The Commission on Enhancing National Cybersecurity established by President Obama recently released a 90-page Report on Securing and Growing the Digital Economy, a report whose explicit purpose was to make recommendations that would strengthen cybersecurity in both the public and private sectors. The report makes specific and excellent […]

Cloud Use Exacerbates Alert Fatigue

Cloud Use Exacerbates Alert Fatigue

It has been estimated that 90% of organizations will suffer at least one security incident this year. There is no question that organizations are suffering more data security incidents than ever before and that more of these incidents are translating into data breaches than ever before. While prevention […]

IT Pros Consider People Biggest Threat to Cloud Security

IT Pros Consider People Biggest Threat to Cloud Security

Mirroring the findings from the Business Perception of IT Security, which found that the Insider Threat (careless or uninformed employee actions) were the root cause of most data breaches and the top cyberthreat, the Cloud Security Survey from Netwrix found that 61% of respondents believe their own employees pose more risk […]