Cloud Security July 20, 2017 Cloud Security Is Not an Either/Or 2 min read - Cloud security is neither a magic bullet for analysts, nor a particularly vulnerable target for cybercriminals. It all depends on the effort you put in.
June 15, 2017 DLP Dangers? Collaboration Violations Put Cloud Security at Risk 2 min read - Data loss prevention (DLP) policies aren't doing enough to combat collaboration tool violations. What does this mean for cloud security?
May 22, 2017 It’s Time for Cybersecurity in Asia-Pacific to Enter the Era of Cognitive, Cloud and Collaboration 2 min read - IBM will host an e-summit on cybersecurity in Asia-Pacific to foster collaboration and help IT teams embrace emerging technologies.
Data Protection April 20, 2017 Avoid Lengthy Pit Stops Along the Road to the Data Protection Finish Line 3 min read - Many companies lack a sense of urgency in the race toward total data protection and are unprepared to deal with attacks, compliance requirements and more.
March 27, 2017 The Next Destination for Your Security Operations Is the Cloud 2 min read - Security operations are moving to the cloud, and IT managers are finding ways to support the use of a broad range of business applications on demand.
Cloud Security March 22, 2017 Securing Your Cloud-Based Resources: Start With These Four Areas 3 min read - With cloud-based resources becoming an integral part of the enterprise, it's time for security leaders to recognize the best ways to protect these assets.
Intelligence & Analytics March 7, 2017 From Linear to Orbital: Rethinking Defense in Depth 3 min read - Defense in depth uses a layered approach to protecting networks and systems from breaches. It relies on multiple lines of defense to provide redundancy.
Cloud Security March 6, 2017 Closing Cloud Security Gaps at Every Step of the Migration Process 3 min read - When moving data and services to the cloud, IT leaders must implement cloud security measures at every step of the complex migration process.
Data Protection February 28, 2017 How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability 4 min read - It's critical to protect sensitive cloud-based data using encryption while it is being stored, and to delete it securely at the end of its life cycle.
February 9, 2017 Hook, Line and Scammer: New Phishing Attack Favorite Reels In Cloud Storage 2 min read - The phishing attack is still fraudsters' favorite trick. Researchers recently observed new phishing campaigns aimed at cloud storage services.