If your company uses mobile devices to conduct company business, such as accessing company email or sensitive data, pay close attention to mobile security and the potential threats that can expose …
5 Mobile Security Lessons From the Department of Defense
Several years ago, the National Security Agency wasted millions on a circuit-switched approach to mobile security strategy. With help from the Department of Defense, the NSA is doing things differently now. Enterprise CIOs can learn a few things from the effort, too.
Vulnerable to attack: Small businesses should boost cyber defenses
When cyberthieves attacked Empire Industries’ computer network, technology manager Rich Shemanskis could see files in the process of being infected by malicious software.
SMALLBIZ SMALL TALK: Vulnerable to attack
NEW YORK — When cyberthieves attacked Empire Industries' computer network, technology manager Rich Shemanskis could see files in the process of being infected by malicious software.
Windows 10 Exploit Guard Boosts Endpoint Defenses
Windows Defender Exploit Guard that ships with Windows 10 Fall Creators Update, systems running Microsoft’s Windows 10 operating system can fend off emerging threats, Microsoft says.
How acquirers are adapting to the mobile threat
As trends in payments technology take hold or taper off, it's safe to say that one is firmly entrenched: The shift to mobile and integrated point of sale devices.
McAfee Complete Endpoint Protection and Symantec Endpoint Protection: Buyer's guide and reviews
Discover what real IT Central Station users think of endpoint protection solutions.
The Top Cloud Computing Vulnerabilities and Threats
Cloud computing vulnerabilities When contemplating to migrate to cloud computing, you have to consider the following security issues for you to enhance your da…
The top cloud computing threats and vulnerabilities in an enterprise environment
When deciding to migrate to the cloud, we have to consider the following cloud vulnerabilities and threats.
Spotlight on Mobile
Wednesday, May 10, 2017 About the Webinar System Requirements NISO has developed a quick tutorial, How to Participate in a NISO Web Event . Please view the recording, which is an overview of the web conferencing system and will help to answer the most commonly asked questions regarding participating in an online Webex event You will need a computer for the presentation and Q&A. Audio is…
IT battles the top three mobile security threats
Mobile security threats, such as malware and file-sharing data leakage, are escalating across businesses. IT needs strong best practices to prevent corporate data loss.
Understanding how Symantecs Vulnerability Assessment Scan service works
FAQ to the technicalities of the Symantec VA scan its basics and features.
Poorly conceived security, privacy rules could create new vulnerabilities: Symantec
Growing concerns around security and privacy of information in the digital world will drive legislative and regulatory actions globally, but poorly conceived regulations could also lead to creation of
Enterprise Endpoint Security: Why Antivirus is only a Basic Line of Defense
For the consumer home and mobile markets, antivirus protection is often adequate for endpoint security. The malware and infections that do the most damage to personal computing devices are often ones that bring zero-day exploits into play or have not yet been classified by antivirus updates. However, users that keep their virus definitions up-to-date and... Read more »
Why a modern security strategy demands endpoint protection
Much of the conversation around microsegmentation has involved network-based solutions. But, the endpoint is a commonly-overlooked area for protection.
Why Windows XP users are more vulnerable to threats
Beyond losing official support from Microsoft, the 13-year-old OS was developed in a simpler time when today's cyberthreats were far in the future.
What Defense Manufacturers Need to Know about the Rapidly Growing CBRNE Threat
From basic research to field deployment, Battelle translates the latest advances in science into products and services that make the world safer.
How to use threat intel to boost mobile security
Integrating threat intelligence feeds with mobile device management platforms can shore up BYOD security
What's New With Symantec Endpoint Protection 14
Join Symantec and Carahsoft for a complimentary webcast on Symantec Endpoint Protection 14. SEP 14 is designed to address today's threat landscape with a comprehensive approach that spans the attack chain and provides defense in depth. By utilizing the world's largest civilian threat intelligence network, SEP 14 is able to offer: Network Intrusion Prevention, URL and Firewall Policies Device Control
Vulnerable to attack: Businesses should boost cyber defenses
NEW YORK (AP) - When cyberthieves attacked Empire Industries' computer network, technology manager Rich Shemanskis could see files in the process of being infected by malicious software "We were looking at the network, and I noticed it, and another guy noticed it. We're looking at the files and watching them change," Shemanskis recalls about the attack three years ago Shemanskis told staffers to quickly shut down…