With 500,000 new security threats being discovered every day, and new challenges like cloud and mobile device security whipsawing IT priorities, the need to retain skilled cyber-security pros has never been greater. Unfortunately, competition for those professionals is also at an all-time high. More than 209,000 cybersecurity jobs are unfilled in the U.S., and the […]

New server-side ransomware such as SamSam and Maktub are on the hunt for victims. Unlike older ransomware techniques, ransomware now gets installed without user actions such as clicking on links or opening files.   Instead, today’s ransomware targets vulnerable servers like those with unpatched software and out-of-date applications. For example, SamSam has spread primarily by attacking […]

Proposed Textalyzer Targets Distracted Drivers Using a phone while driving can be as deadly as drinking and driving and some lawmakers in New York have proposed legislation to make sure distracted drivers are held accountable. In the land of selfies, texting, and social media 24/7, the legislation authorizes law enforcement to use a device called […]

Whatever the specific configuration of your cloud, be it public, private, or a mix of both, there are security risks that aren’t immediately apparent, ranging from the technical to organizational to issues of governance. Here are five things you need to know about integrating security across your multiple cloud deployments for optimal security. 1) Know […]

Big data introduces new wrinkles for managing data volume, workloads, and tools. Securing increasingly large amounts of data begins with a good governance model across the information life cycle. From there, you may need specific controls to address various vulnerabilities. Here are a set of questions to help ensure that you have everything covered. 1. […]