This report looks at common vulnerability scenarios related to enterprise mobility and how much they could cost enterprises from financial and competitive standpoints. This paper also examines multiple device management strategies for their capabilities to protect enterprises against loss. It assesses how losses due...
There has been a lot of hype around the Bring Your Own Device (BYOD) trend over the last few years. Regulatory and legal compliance issues, concerns over privacy, costs and the difficulties of managing such a fragmented array of devices and applications make fully supporting BYOD a real challenge for IT. Strategies...
As you decide on an Enterprise Mobility Management (EMM) solution, there are dozens, if not hundreds, of factors to weigh. Comparing features across three or four shortlisted solutions can become incredibly time-consuming. As a starting point, consider the issues in the following list. It's derived from third-party...
Whether launched to disrupt an organization or to distract a security team so that fraud can be committed elsewhere, Distributed Denial of Service (DDoS) attacks remain a powerful weapon in today's arsenal of advanced threats. For any organization with significant revenue associated to online transactions, an...
It's not exactly breaking news that cardholder security is front and center of the payments ecosystem "to do" list. And, with that, the search for a solution that keeps cardholder data secure without compromising the consumer experience at checkout. Nowhere is this more important than online, where the incidences of...
The explosive growth of eCommerce has focused attention on security concerns associated with online payment transactions. Cardholders worry about the safety of online transactions while card issuers are concerned about balancing the risks and costs of payment fraud with a loss of revenue caused by transaction...
Breached dating website FriendFinder allegedly missed email warnings from security researchers that its site had been breached and customers' data was being sold on a "darknet" site. What can other businesses learn from that apparent mistake?
BitSight Technologies conducted research on breached organizations and how they were impacted by botnets. The results are eye-opening, says CTO Stephen Boyer, offering insights from this study.
Extending workloads to cloud computing platforms offers the promise of speed and agility. But it does not relieve you of your responsibility to secure data and applications from attack. Unfortunately, traditional security approaches fall short by being incompatible with the dynamic nature of cloud and hybrid cloud...
What's wrong with the way we're practicing cybersecurity now? What are the biggest security gaps? BAE Systems Applied Intelligence's Jim Anderson shares his view.
A game-changing impact of the Edward Snowden leaks about previously secret National Security Agency surveillance activities is the increased use of encryption, such as to protect email, says Peter Swire, a former White House chief privacy counsel.
Data is the lifeblood of today's digital businesses, and protecting it from theft, misuse, and abuse is the No. 1 responsibility of every S&R leader. Hacked customer data can erase millions in profits within weeks, stolen intellectual property can erase competitive advantage in less than a year, and unnecessary...
Organizations are increasingly relying on data warehouses to provide the business critical reporting and analysis needed to empower business decisions and drive results. The data warehouse is a central repository for integrating data from one or more disparate sources such as applications, databases and legacy...
Hardly a week goes by without headlines about a breach of customer data. Less frequent, but just as alarming, are the publicly reported examples and allegations of
intellectual property theft. Data security and privacy - and by extension, brand reputation - are front and center today and will quickly become a...
News headlines about the increasing frequency of information and identity theft have focused awareness on data security and privacy breaches - and their consequences. In response to this issue, regulations have been enacted around the world. Although the specifics of the regulations may differ, failure to ensure...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.