System Audit or Information Audit
Vishal Gupta, CEO, Seclore explains why focusing the audit to the asset over and beyond the cost base is the right approach in cases where information is not contained within any perimeter. Most...
View Article14 IT Security Predictions For 2014
What are the IT security threats your business needs to look out for in 2014? With the end of the 2013 approaching, we start looking forward to the coming year, to try and predict what lies ahead. Like...
View ArticleWho is Practicing Security Best Practice?
There is a term in the Information Security field that tries my patience in no uncertain terms. That term is, “best practice”. People love to bandy this about in discussions about their security...
View ArticleSnowden Leaks: NSA Tracking Billions of Mobile Phones for User Location Data
A reporter takes a mobile phone picture of NSA Alexander as he takes his seat to testify at the U.S. Capitol in Washington. The latest Snowden leaks have revealed that the US government’s National...
View ArticleTop Ten Cyber Security Stories of 2013
This was an important year for cyber security. Could the government build on its London conference of Cyber Security of 2012 in its attempt to position itself as a global leader? Would Anonymous...
View ArticleTransform IT Security Process Into Business Action
CSOs must focus less on technology and proactively engage the business by framing security risks in business terms, developing detailed worst-case models and reworking IT security risk assessment...
View ArticleSecurity Education = Smart Security Preparation
More than ever, user education, predominantly through the use of electronic communications policies, is becoming central to securing company networks and avoiding cyber-attacks. Ultimately,...
View ArticleBYOD Viewed As a Risk By 65% of Companies
Almost two-thirds of companies across the world have identified the bring-your-own device trend (BYOD) as a risk to business security. The new Global Corporate IT Security Risks 2013 suggests that one...
View ArticleThe State of Security: It’s Broken
It’s time to move past the hyperbole of next-gen security and look to new approaches that show enterprises how to understand and assess their unique risks. Will 2014 be the year of change for the...
View ArticleLaunch of Seclore FileSecure IRM by Red Herring Asia Top 100 company
The Red Herring Asia Top 100 company and financial system integrator, has launched Seclore’s FileSecure information rights management solution in the region. Information rights management is an...
View ArticleCybersecurity: Defending ‘unpreventable’ cyber attacks
Businesses should stop worrying about preventing intruders getting into their computer networks, and concentrate instead on minimising the damage they cause when they do. Read the whole Article at the...
View ArticleSecurity professionals warn against relying on cyber insurance
Security professionals have warned businesses not to rely on cyber insurance in the face of increased cyber attacks. The warning comes after the head of the largest Lloyd’s of London insurer, Stephen...
View ArticleHow to avoid a Sony-like data breach
Benny Czarny, founder and CEO of IT infrastructure provider OPSWAT, outlines his ten top tips for businesses looking to avoid potentially crippling data breaches. Employee security training is an...
View ArticleTurnaround managers take on cybercrime
Attendees at the Connecticut chapter of the Turnaround Management Association’s event earlier this month, titled “Dealing with Cybersecurity: What Turnaround Managers Should Know,” learned that for...
View ArticleUK ranks first in Europe for data breaches
Last year saw more than one billion records compromised thanks to numerous data breaches, claims a recent report, which also found that the UK is at the top of the list when it comes to breaches....
View ArticleAre digital loss prevention and signature-based anti-virus living on borrowed...
Fingerprint-based Data Loss Prevention (DLP) and Signature-based Antivirus (AV) have long been security industry mainstays, but with the speed of the business environment outpacing the technology they...
View ArticleThe hidded benefits of data protection: INVESTMENT
We’ve all seen the headlines: “Laptop stolen – thousands of customer records lost” “Malware on Lime Crime website, payment cards compromised” “California Dentist announces theft of server containing...
View ArticleIs Cloud Storage All The Protection You Need?
My colleagues and I hear it around the office all the time – “Oh, we don’t need your product – we use Dropbox” (or iCloud, or Box, or Google Drive, or – insert your favorite cloud storage solution...
View ArticleData Breach Notification—- HOW TO
Here is a great link for reference purposes. Although it is Australian everyone should know how to handle the Personal Information Security Breaches. / /...
View ArticleWhy all businesses must assume they’ve already been hacked
Thank you Ben Rossi and informationAge .com Hackers and malware are present and active inside your security firewall. Ovum principal analyst Michael Azoff ‘The military and the banks have led – it is...
View Article
More Pages to Explore .....