By now, you have probably heard about the Heartbleed bug, estimated to affect up to two-thirds of all websites using the OpenSSL encryption protocol to protect usernames, passwords, credit and debit card...
Spring cleaning isn’t just for the home. Each year it is a good idea for marketers to check in with their campaigns and shake off the dust in an effort to clean up rusty hinges and iron out the wrinkles.
Enterprises today are fighting an uphill battle when it comes to security. While there is a proliferation of security management and reporting tools available, the lack of integration and visibility can add more complexity and snags rather than less. Working between multiple security systems diverts attention from other tasks in addition to costing money and […]
Spring is in the air; it is the traditional time to clean house, tidy away things you don’t use, and for us geeks, time to dispose of all the old, tech gadgets that we’ve accumulated over the last year. My house is no exception to this, though my wife and I have very different opinions. […]
The Industrial sector often faces unique challenges when it comes to cybersecurity, with more threats targeting critical infrastructure and manufacturing than ever before. The Internet of Things has created new risks as the world and industries within it become increasingly interconnected. Securing the critical infrastructure isn’t just about risk, it’s about retrofitting security into existing […]
Try all we might to develop the perfect data protection and management solution, there will always be those that will not avail themselves to it for one reason or another. We keep striving to develop technologies and features that move the needle, but that doesn’t guarantee 100% adoption. But that is okay. We have to […]
On March 24, Microsoft released Security Advisory 2953095 for Microsoft Word. In-the-wild exploitation of this vulnerability has been observed across limited, targeted attacks. The flaw is a memory-corruption vulnerability that can be invoked when parsing specially crafted RTF files or data. Successful exploitation can give an attacker the ability to run arbitrary code (via remote […]