Symantec named a Leader in the The Forrester Wave: Enterprise Mobile Management, Q3 2014. Read the Forrester Research, Inc report and get in-depth expertise on the enterprise mobility market.
We recommend this analyst report for anyone evaluating enterprise mobility solutions or looking to gain a better...
We recommend this analyst report for anyone evaluating enterprise mobility management (EMM) solutions or looking to gain a better understanding of the market.
Download this report for leading industry insight and to learn:
Key trends that have been identified;
The benefits of an effective EMM...
Want to protect your hard earned email reputation and brand from phishers and spoofers? Not sure where to start or do you find DMARC implementation confusing and time consuming? The Getting Started with DMARC guide will tell you everything you need to know about DMARC and how to quickly get up and running....
FBI Director James Comey's Jan. 7 defense of the bureau's attribution of the Sony Pictures hack to North Korea hasn't silenced many information security experts, who argue that the scant evidence divulged to date proves nothing.
Online shoe and clothing retailer Zappos has reached a settlement with nine state attorneys general over a 2012 data breach that exposed the personal details of more than 24 million customers.
Ninety percent of even the largest global firms are susceptible to targeted attacks. And if adversaries want to get in, they can, says Peter George, CEO of Fidelis Security Systems, who discusses new security strategies.
Information is the life blood of modern business - and increasingly under attack from both traditional insiders motivated by financial gain, and external hackers that compromise insider accounts for criminal purposes and nation state goals.
With insider threats spanning both these areas, this webinar features...
In a Jan. 7 speech, FBI Director James Comey highlighted a bit of evidence to defend his agency's conclusion that North Korea was behind the cyber-attack on Sony Pictures Entertainment.
Credit rating models transformed the way we do business and have existed for almost a century. Now, these same models are inspiring a new way of managing vendor security risk by using externally collected security data to assess and quantify security performance.
Download this white paper to learn:
The...
With the FBI reportedly investigating whether any U.S. financial services firms waged illegal hack-back efforts after DDoS attacks, some security experts contend that hacking back is a bad idea because the cyber-retaliation could cause more problems.
European Bitcoin exchange Bitstamp has temporarily suspended its services after some of its operational wallets were compromised on Jan. 4, resulting in the theft of 19,000 Bitcoins, worth more than $5 million.
The biggest 2014 U.S. health data breaches listed on the federal tally so far demonstrate that security incidents are stemming from a variety of causes, according to a new infographic, which highlights patient risks and takeaways for healthcare organizations.
As organizations set their 2015 priorities for security defenses and breach prevention, they should keep in mind five important lessons learned from last year's top data breaches.
If a hack attack the size of the Sony Pictures incident hit India, security experts warn that few of the nation's public- and private-sector organizations would have the right plans and tools in place to properly defend themselves or react.
Sony CEO Kazuo Hirai praises employees' actions in the wake of the "vicious" attack against Sony Pictures, which the FBI has attributed to North Korea, using evidence that the White House says will stay classified.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.