In a recent report with ESG, Tackling Attack Detection and Incident Response, we surveyed 700 IT professionals to better understand the security challenges faced by organizations today. The report also expands on the concept of the ‘Golden Hour,’ the narrow window of time in which threat detection and response can greatly minimize the ultimate impact […]

Protecting the Internet of Things means protecting the privacy of customers and colleagues. Most of the devices in the Internet of Things (IoT) reside outside of your security wall. Some, such as mobile point-of-sale terminals and other publicly accessible devices, are outside because they could be a gateway for malicious attacks. Others, such as sensors […]

Forget making the football team or honor society, for teens, social hierarchy is measured by how hefty your follower count is on Twitter. Studies show that while Facebook is still the #1 social network for teens, Twitter is one of the top three digital cruising lanes. And if you think your teen doesn’t have a […]

We have seen an increasing amount of articles published about the “Dark Web,” underground cybercriminal sites that are hosted on hidden servers and can be accessed only by using Tor. One example of a Dark Web site hosted on one of these “.onion” domains was the Silk Road, a site infamous for the buying and […]

Still running a Windows Server 2003? You’ll want to read this. As you may or may not have heard, the end of life for Windows Server 2003 is now set for July 14th, 2015 – meaning after that date, it will no longer be supported by Microsoft. So, what does this mean for you? It […]