Cyber Security Tips for Business — Business Internet Security
Our expert bloggers will reveal their findings and offer tips on how to maximize your online security so you can focus on what’s most important – your business.
If the cyber theft of intellectual property attacks an organization’s ability to innovate, theft of business confidential information attacks its ability to execute as a business. Verizon’s 2014 Data Breach Investigations Report (DBIR) found that 22 percent of breaches are the result of cyber espionage attacks, and that the victims were in the public, professional […]
Timing is everything in an airport and to handle the growth in travelers and airlines at Cologne Bonn, the IT infrastructure includes several large networks and various system architectures, which must be harmonized and centrally operated. Cologne Bonn is a thoroughly modern airport that has many advanced procedures in place to help them manage everything efficiently. […]
Security professionals and hackers descended upon Las Vegas to take part in Black Hat USA 2014and DefCon conferences, recent news of the massive cybercrime operation that leached $3.75 billion over a two-year period from the Brazilian Boleto payment network is sure to enter the conversation. In his blog, our own Gary Davis indicated that the […]
My last post illustrated the different facets of cybercrime and cyber espionage. Today, we dig deeper into the innovation costs associated with the theft of intellectual property. The most important area for loss is in the theft of intellectual property and business-confidential information—economic espionage. It is difficult, however, to precisely estimate these losses. This is […]
They say you can’t teach an old dog, new tricks—or can you? The technology landscape has changed dramatically over the last 10 years, and many security approaches organizations previously relied on are no match for today’s advanced threats. Tools like Security Information and Event Management (SIEM) have become critical to securing an increasingly complex network […]