The Latest in IT Security

1

After three decades working in IT, I’ve noticed persistent peculiarities in how people deal with security oversight. It doesn’t matter if it’s a small mom-and-pop shop or the largest of corporations — the same behavior exists. And it’s the driving force behind so many unnecessary risks and subsequent data breaches. The root of the problem […]

Read more ...

1

Epiphany is a configurable solution that uses electronic workflows, centralized storage, and smart data optimization features to cut down on hours of labor and documentation and put enterprise data to work to solve agency challenges. Epiphany is both a process and secure information management solution capable of searching an organization’s historical data and completing many […]

Read more ...

1

The zero trust approach to enterprise security proposed by analyst firm Forrester Research nearly a decade ago can be challenging to implement. You need a clear understanding of the changes it entails and the impact it can have on the user experience. The model emphasizes robust user authentication and device validation over network and endpoint […]

Read more ...

1

FireEye analyzed over half-a-billion emails from 1H 2018, and found that 32% of email traffic seen in the first half of 2018 was considered ‘clean’ and actually delivered to an inbox. Their report also found that 1 in every 101 emails had malicious intent. When compared to the previous six-month period, the changes in both […]

Read more ...

Categories

FRIDAY, SEPTEMBER 21, 2018

Featured

Archives

Latest Comments

Social Networks