The Top 5 IT Security Trends for 2018

In 2017, the IT community was primarily focused on mitigating external threats, such as cloud hacks and state-sponsored cyberattacks. However, many of this year’s data breaches—notably Equifax and Anthemwere actually the result of insider misuse or human mistakes. These breaches clearly demonstrate that building even the most robust external defense is not sufficient, since employees..
Read more

Data Security: Best Practices for Keeping Data Secure

There is not an exact science to data security, however, with the General Data Protection Regulation (GDPR) coming into effect in 2018, the financial penalties and loss of reputation may cause more organizations to work on an effective solution. Some best practices include checks of processes, policies, people, and of course software. Though many organizations may not feel as if they have the time or bandwidth to analyze their current situation, good or bad, companies need to know where current IT practices stand.
Read more

Matter of fact, it’s all dark

Deputy Attorney General Rod Rosenstein touched on encryption when speaking at the U.S. Naval Academy recently: Encryption is a foundational element of data security and authentication … But the advent of “warrant-proof” encryption is a serious problem … Our society has never had a system where evidence of criminal wrongdoing was totally impervious to detection, The post Matter of fact, it’s all dark appeared first on Voltage.
Read more

Three Ways You Can Protect Your Data While Traveling

A lot can change in ten years. I’m sure most of you remember what a royal pain it was to work remotely—bulky laptops, spotty Internet connections, nightmarish VPN authentication. Nowadays, none of that stuff is really a problem anymore. Electronics have never been more compact. We’ve got smartphones, tablets, and laptops more powerful than anything The post Three Ways You Can Protect Your Data While Traveling appeared first on TechSpective.
Read more

Brace for Hybrid Threats and Extortion-Fueled Attacks Next Year

There’s no end in sight for ransomware and, based on what we’ve seen this year, these threats will become even more aggressive. Worse still, hackers have started incorporating extortion into other types of attacks. Ransomware pushers have had their sights on businesses for a couple of years now. But recent outbreaks including WannaCry, NotPetya and..
Read more

GDPR: Who is responsible for what?

The EU General Data Protection Regulation (GDPR) and the Network Information Security (NIS) directive are already causing a flurry of activity among businesses. Who is ultimately responsible for cybersecurity seems to be attracting particularly intense discussion. According to a recent study by Palo Alto Networks, cybersecurity is usually the responsibility of CIOs in 50% of companies compared to 30% of CISOs. This is a surprising finding, especially considering that the role of Chief Information Security Officer implies this task. Whether this changes is probably more of a political rather than technical matter. At least around 30 percent of respondents believe that the CISO or CSO should be responsible for cybersecurity. The current situation points to long established and seldom adapted rituals in the distribution of responsibility within companies.
Read more
Page 1 of 2712345...1020...Last »