Quantcast
Channel: IRM Secure BLOG » BYOD
Browsing all 25 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

System Audit or Information Audit

Vishal Gupta, CEO, Seclore explains why focusing the audit to the asset over and beyond the cost base is the right approach in cases where information is not contained within any perimeter. Most...

View Article



Image may be NSFW.
Clik here to view.

14 IT Security Predictions For 2014

What are the IT security threats your business needs to look out for in 2014? With the end of the 2013 approaching, we start looking forward to the coming year, to try and predict what lies ahead. Like...

View Article

Image may be NSFW.
Clik here to view.

Who is Practicing Security Best Practice?

There is a term in the Information Security field that tries my patience in no uncertain terms. That term is, “best practice”. People love to bandy this about in discussions about their security...

View Article

Image may be NSFW.
Clik here to view.

Snowden Leaks: NSA Tracking Billions of Mobile Phones for User Location Data

A reporter takes a mobile phone picture of NSA Alexander as he takes his seat to testify at the U.S. Capitol in Washington.   The latest Snowden leaks have revealed that the US government’s National...

View Article

Image may be NSFW.
Clik here to view.

Top Ten Cyber Security Stories of 2013

This was an important year for cyber security. Could the government build on its London conference of Cyber Security of 2012 in its attempt to position itself as a global leader? Would Anonymous...

View Article


Image may be NSFW.
Clik here to view.

Transform IT Security Process Into Business Action

CSOs must focus less on technology and proactively engage the business by framing security risks in business terms, developing detailed worst-case models and reworking IT security risk assessment...

View Article

Image may be NSFW.
Clik here to view.

Security Education = Smart Security Preparation

More than ever, user education, predominantly through the use of electronic communications policies, is becoming central to securing company networks and avoiding cyber-attacks. Ultimately,...

View Article

Image may be NSFW.
Clik here to view.

BYOD Viewed As a Risk By 65% of Companies

Almost two-thirds of companies across the world have identified the bring-your-own device trend (BYOD) as a risk to business security. The new Global Corporate IT Security Risks 2013 suggests that one...

View Article


Image may be NSFW.
Clik here to view.

The State of Security: It’s Broken

It’s time to move past the hyperbole of next-gen security and look to new approaches that show enterprises how to understand and assess their unique risks. Will 2014 be the year of change for the...

View Article


Image may be NSFW.
Clik here to view.

Launch of Seclore FileSecure IRM by Red Herring Asia Top 100 company

The Red Herring Asia Top 100 company and financial system integrator, has launched Seclore’s FileSecure information rights management solution in the region. Information rights management is an...

View Article

Cybersecurity: Defending ‘unpreventable’ cyber attacks

Businesses should stop worrying about preventing intruders getting into their computer networks, and concentrate instead on minimising the damage they cause when they do. Read the whole Article at the...

View Article

Image may be NSFW.
Clik here to view.

Security professionals warn against relying on cyber insurance

Security professionals have warned businesses not to rely on cyber insurance in the face of increased cyber attacks. The warning comes after the head of the largest Lloyd’s of London insurer, Stephen...

View Article

How to avoid a Sony-like data breach

Benny Czarny, founder and CEO of IT infrastructure provider OPSWAT, outlines his ten top tips for businesses looking to avoid potentially crippling data breaches. Employee security training is an...

View Article


Image may be NSFW.
Clik here to view.

Turnaround managers take on cybercrime

Attendees at the Connecticut chapter of the Turnaround Management Association’s event earlier this month, titled “Dealing with Cybersecurity: What Turnaround Managers Should Know,” learned that for...

View Article

UK ranks first in Europe for data breaches

Last year saw more than one billion records compromised thanks to numerous data breaches, claims a recent report, which also found that the UK is at the top of the list when it comes to breaches....

View Article


Are digital loss prevention and signature-based anti-virus living on borrowed...

Fingerprint-based Data Loss Prevention (DLP) and Signature-based Antivirus (AV) have long been security industry mainstays, but with the speed of the business environment outpacing the technology they...

View Article

The hidded benefits of data protection: INVESTMENT

We’ve all seen the headlines: “Laptop stolen – thousands of customer records lost” “Malware on Lime Crime website, payment cards compromised” “California Dentist announces theft of server containing...

View Article


Is Cloud Storage All The Protection You Need?

My colleagues and I hear it around the office all the time – “Oh, we don’t need your product – we use Dropbox” (or iCloud, or Box, or Google Drive, or – insert your favorite cloud storage solution...

View Article

Data Breach Notification—- HOW TO

Here is a great link for reference purposes.  Although it is Australian everyone should know how to handle the Personal Information Security Breaches.  /  /...

View Article

Image may be NSFW.
Clik here to view.

Why all businesses must assume they’ve already been hacked

Thank you Ben Rossi and informationAge .com Hackers and malware are present and active inside your security firewall. Ovum principal analyst Michael Azoff ‘The military and the banks have led – it is...

View Article
Browsing all 25 articles
Browse latest View live




Latest Images