Blog Archives

Cisco: Cybercriminals are becoming more evasive and sophisticated

As organizations innovate, they must be aware of changing security factors and adjust their defenses accordingly.

Continue Reading →

Java finally plans to remove serialization…eventually

Oracle has unveiled plans to remove serialization from its Java software, fixing a long-term vulnerability. 

Continue Reading →

Understanding the state of enterprise digitization

Enthusiasm for web-backed workflows clearly continues to flourish, but how are organizations participating in this technological revolution incorporating cutting-edge products and services into their operations?

Continue Reading →

Verizon report: Botnets pose big problems for businesses

The researchers at Verizon touched on an ascendant black hat tool poised to cause major disruption in an online era dominated by internet of things and cryptocurrency technology: the botnet.

Continue Reading →

Strategies for bolstering enterprise application security

Businesses must carefully address application security and ensure that the mobile portals that live on employee smartphones can keep both personal and work-related data out of the hands of hackers.

Continue Reading →

How blockchain is transforming the financial services space

Among the many organizations testing the blockchain waters, those in the financial services space are best positioned to see return on investment on phase-one implementations.

Continue Reading →

Strategies for addressing the legal risks of IoT implementation

The increased complexity of IoT workflows can not only lead to everyday productivity problems but also leave businesses vulnerable legally.

Continue Reading →

Keys to achieving GDPR compliance

Here are some of the essential data management aspects IT teams must address to meet GDPR compliance standards and avoid considerable fines.

Continue Reading →

Report: IT stakeholders doing little to address IoT cyberattacks

It appears that the information technology stakeholders responsible for protecting enterprise IoT setups are not prepared for such work, especially where it concerns mitigating third-party risk.

Continue Reading →

SonicWall: The digital threat environment is intensifying

SonicWall recently analyzed insights collected from approximately 1 million sensors in 200 countries and gathered testimony from respected data security consultants to formulate a sweeping picture of the modern cybercrime landscape.

Continue Reading →