Federal Report Urges Incoming Administration to Prioritize Cybersecurity

Federal Report Urges Incoming Administration to Prioritize Cybersecurity

The Commission on Enhancing National Cybersecurity established by President Obama recently released a 90-page Report on Securing and Growing the Digital Economy, a report whose explicit purpose was to make recommendations that would strengthen cybersecurity in both the public and private sectors. The report makes specific and excellent […]

IT Pros Consider People Biggest Threat to Cloud Security

IT Pros Consider People Biggest Threat to Cloud Security

Mirroring the findings from the Business Perception of IT Security, which found that the Insider Threat (careless or uninformed employee actions) were the root cause of most data breaches and the top cyberthreat, the Cloud Security Survey from Netwrix found that 61% of respondents believe their own employees pose more risk […]

2017 Will be a Regulatory Wake-Up Call

2017 Will be a Regulatory Wake-Up Call

There have been many predictions for 2017 which have touched on the impact that the EU GDPR will have on organizations around the globe, but the truth is that the GDPR is not the only change on the horizon. Federal, state, and industry regulators have all made moves […]

Modern Embedded Endpoint Security with Absolute DDS: IDC Technology Spotlight

Modern Embedded Endpoint Security with Absolute DDS: IDC Technology Spotlight

Enterprise IT teams face an uphill struggle to maintain visibility into and control over corporate resources and to mitigate risks to critical business assets. The ever-growing distributed nature of corporate networks, brought about by Cloud adoption and the proliferation of mobile devices, has increased the complexity over IT […]

Decentralization of IT Tech Increases Security Risk

Decentralization of IT Tech Increases Security Risk

IT is becoming increasingly decentralized, with purchasing and management decisions being made at the business level. As cloud computing continues to move technology beyond IT, data is increasingly at risk. According to a new study by VMware, 69% of respondents believe IT has become increasingly decentralized over the […]

What China’s New Cybersecurity Law Means for You

What China’s New Cybersecurity Law Means for You

The Chinese government has just passed a cybersecurity law that has broad implications for international businesses. The move comes with great criticism, with some calling the law “draconian” and “abusive” while others note the law is “vague” enough to spark worries of “censorship and espionage.” The legislation was […]

Is Your Data Breach Response Plan Effective?

Is Your Data Breach Response Plan Effective?

We’ve posted many times about the importance of having a data breach response plan in place. Indeed, the FTC just released its own guidance on data breach response. A new study, however, demonstrates that “having a response plan is simply not the same as being prepared,” particularly if […]

Security in the Cloud Requires Visibility

Security in the Cloud Requires Visibility

There is a rapid enterprise movement toward the cloud, and yet such movement has remained uncoordinated. Gartner estimates that less than one-third of enterprises have a documented cloud strategy. This has led to an explosive growth in Shadow IT and Shadow data as well as application development that […]