Menu
security

security - News, Features, and Slideshows

security in pictures

News about security
Tutorials about security
  • How CISOs can create security KPIs and KRIs

    If your information security functions like most, it develops copious amounts of data about the business's security that it delivers on a regular basis. And typically it never gets read.

    Written by Thor Olavsrud26 June 15 03:07
  • How to use Google's new privacy and security tools

    Google stores, manages and sometimes sells an astonishingly large and complex amount of user data. Unfortunately, that digital information isn't always kept secure or private, but Google puts some degree of control in the hands of its users. To offer you a little more control, Google this week rolled out an updated online hub designed to help manage privacy settings, called My Account, as well as a pair of tools that streamline the process of safeguarding user data.

    Written by Matt Kapko03 June 15 02:51
  • 5 Ways to Prevent Data Loss in Mobile Environments

    Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data loss on mobile devices.

    Written by Kim Lindros and Ed Tittel20 March 14 13:15
Features about security
  • How to implement an effective BYOD policy

    Companies have accepted that BYOD is a reality. The challenge now is striking a balance between security and flexibility.

    Written by Sarah K. White26 Sept. 16 21:58
  • Whaling emerges as major cybersecurity threat

    Fraudsters are using legitimate executive names and email addresses to dupe unsuspecting employees to wire money or sensitive documents to their accounts. The CTO of the Boston Celtics, for one, is fighting back.

    Written by Clint Boulton21 April 16 23:20
  • You’ve been hit with ransomware. Now what?

    When their data has been stolen, and is being held hostage, companies are increasingly caving in to cybercriminal demands for payment. Short of paying up, the best defense is a good offense.

    Written by Jonathan Hassell21 April 16 20:53
  • The year in fraud: 2015 in 13 numbers

    It's that time of year: Round ups, hot takes and eulogies for the year abound. We're no different, but we're going to tell the story of 2015 a little differently -- though numbers. Ten of them to be exact. In no particular order, here's how hackers and scammers and the many security flaws they found got us on edge for this year … and the next.

    Written by Jen A. Miller16 Dec. 15 15:16

Whitepapers about security

  • The definitive email security ebook

    The Problem: Attacks are evolving faster than email defenses. Organizations are spending more on cybersecurity than ever, even as losses from data breaches, business disruption, and fraud continue to mount. Learn how to prevent the top email fraud tactics including: Business Email Compromise techniques Advanced Malware including Ransomware Outbound Phishing Get the 5 steps to building your email security strategy across the entire attack chain – from prevention through real-time response. Download the Definitive Email Security Strategy Guide now.

  • Human Factor Report 2017

  • Electronic Signature Guide for Banks

  • Guide to Electronic Signatures

Videos about security

Market Place