Identity & Access April 15, 2015 To Err Is Human: Why Your Users’ Identity Is Your Security’s Weakest Link 2 min read - Organizations should consider using an identity and access management solution to reduce their risk of a breach related to human error.
Data Protection April 15, 2015 The Business of Cyber Risk Assessment for Data Security 2 min read - Many data security solutions have a hard time effectively addressing and measuring cybersecurity risks in an enterprise environment.
April 14, 2015 Gartner: IBM Security Growth Outpacing the Overall Security Software Market < 1 min read - The growth of IBM Security is outpacing the overall security software market by nearly three times, according to a recently released report from Gartner.
Fraud Protection April 14, 2015 Stolen Identity Tax Refund Fraud: Who Is Getting Your Refund? 3 min read - Stolen identity tax fraud is a growing problem in the United States as criminals steal victims' PII and file returns on behalf of them.
CISO April 14, 2015 RSA Conference: Six Must-Attend Sessions for CISOs 3 min read - If you are a CISO attending the RSA Conference 2015, check out these top educational sessions that can help you improve your role and responsibilities.
Cloud Security April 14, 2015 The Grand Challenge for Cloud Security 2 min read - The flexibility and openness of the cloud has created a number of cloud security concerns in terms of the privacy, integrity and availability of data.
April 13, 2015 Filing Taxes Online? Take a Pass on Public Wi-Fi 2 min read - Americans filing taxes online should avoid doing so over public Wi-Fi networks so they aren't the next victims of cybercriminal activity.
Endpoint April 13, 2015 Mobile Security Framework: How to Keep Enterprises Secure 3 min read - In order to combat potential data breaches, organizations must focus their attention on mobile security and bring-your-own-device policies.
April 13, 2015 AlienSpy RAT Spreads Internationally, Evades Antivirus Detection 2 min read - A research advisory says the AlienSpy RAT is deploying the Citadel malware across financial institutions and stealing data in other organizations.
Malware April 13, 2015 Security Excellence: How an IBM Threat Response Team Took On the Waski Virus 2 min read - While it's important to have high-quality technology in place, threat response teams can have a dramatic effect on the outcome of a security incident.