The latest “State of Information Security Survey” from consulting firm PcW sheds some new light on what organizations are doing to protect their data assets from hacker attacks and other incidents. And it helps to illustrate how cyber security has become a top-of-mind consideration for business leaders as they try to stay a step ahead of the bad actors.
All about Virtualization and Cloud Security | Recent Articles:
A number of factors are creating a greater sense of urgency for IT security efforts at many organizations. High-profile data breaches, increased online transactions, existing and emerging regulatory mandates, increasingly sophisticated attacks and other factors are forcing business leaders to make data protection a higher priority than it has been.
How mature is your organization’s cyber security program? It’s a relevant question, especially considering how data breaches have become increasingly prevalent and more damaging for organizations.
What worries business executives the most these days? Lots of things, but cyber security breaches are certainly among the key concerns.
We’ve touched on the issue of online privacy in previous posts, but recent data breaches once again hammer home the fact that virtually no information online is safe from exposure. The key lesson for security executives? If your company experiences a hack that exposes sensitive data, it could lose the trust of valued customers and business partners.
When working with organizations, the cost of replacing an incumbent endpoint antimalware solution can be a major roadblock. While operations and security teams may want to deploy a better solution, they need to address internal costs. The following are aspects teams need to consider.
Just when many corporate security and IT executives thought they were getting something of a handle on the ever-expanding technology infrastructure, along comes an emerging trend that could make their tasks more complex: wearables in the workplace.
Comprehensive security – that which spans as many endpoint types used by an organizations as possible – can be a challenge. With BYOD initiatives, virtualization, and public cloud, the variety of endpoints, which contain or have access to corporate data, is increasing.
There is a lot of talk about “cloud security”, but that simple phrase can mean many things. In general, we should split the conversation between: 1) security for cloud, and 2) security from the cloud. Within the latter, there are distinctions.
One of the lessons children learn in kindergarten or preschool or even earlier at home is how to share with others.
One of the greatest risks to the success of a Virtual Desktop Infrastructure (VDI) project comes from an unexpected source – the endpoint antimalware. It’s not because of the protection offered (although a VDI deployment can be a great opportunity to upgrade), but rather, it’s because of performance.
A recent and exhaustive report by non-profit research and analysis firm RAND Corp. included some interesting and somewhat discouraging findings regarding the state of corporate information security.