Balance Prevention with Response in Your Security Spending

Balance Prevention with Response in Your Security Spending

According to the latest research from Gartner, worldwide spending on information security products and services will likely reach $81.6 billion in 2016.

Embrace the Shadow IT Mindset, Not the Shadow

Embrace the Shadow IT Mindset, Not the Shadow

Gartner predicts that within the next 4 years, one third of successful attacks on enterprises will be on Shadow IT resources. But we also know that clamping down on Shadow IT with draconian IT restrictions can often exacerbate the issue.

3 Strategies to Stop Data Bleed in the Cloud

3 Strategies to Stop Data Bleed in the Cloud

The Insider Threat already lives in the cloud. Right now, IT lacks visibility into the data being used in the cloud.

How to Close the Gaps In Your Security Strategy

How to Close the Gaps In Your Security Strategy

For years, organizations have been secured like fortresses, building walls around networks, applications, storage containers, and devices. But those walls crumble the moment they’re needed.

The Download: This Week’s Top Security News – August 19. 2016

The Download: This Week’s Top Security News – August 19. 2016

This week we cover cybersecurity at the Rio Olympics, ransomware as the canary in the mine, and the Wikileaks database.

Latest HIPAA Settlements Focus on ePHI Protection

Latest HIPAA Settlements Focus on ePHI Protection

These two new HIPAA settlements are meant to send a strong message about enforcement and accountability. The result for one of those cases was a record-setting settlement of $5.55 million.

Your Corporate Data is Hiding in the Cloud

Your Corporate Data is Hiding in the Cloud

The number of cloud apps in use across enterprises is soaring, and it was already a lofty number. On average, employees use 917 different cloud apps within a given enterprise organization.

Technology Investment: Who Makes the Decisions in Your Company?

Technology Investment: Who Makes the Decisions in Your Company?

What happens when IT purchases are made with the explicit permission of IT but without specific oversight? With proper planning and guidelines, decentralized IT does not need to lead to true Shadow IT.