dlp


Today’s cybersecurity threats target all parts of the network and nearly every device attached to it, making the potential threat landscape virtually boundless. When you pair technically skilled criminals with the attractiveness of financial data, trying to keep information safe is a constant battle. With this in mind, organizations like the SEC and FINRA have developed initiatives to help guide the financial services industry towards success, and at the same time, to also hold breached organizations accountable if they were inadequately prepared. SEC... [Read More]
by RSS Bill Hogan  |  Apr 27, 2017  |  Filed in: Industry Trends & News
The cloud, Internet of Things (IoT),  mobility, and big data analytics are four primary trends that are driving change, and financial services organizations are being tasked to keep up. While digital business is simplifying life for the users of financial services, companies are being forced to deal with these trends’ impact on the makeup and footprint of their security solutions. The need for an architecture and strategy that is fully suited to support these trends is paramount to success. As a result, today’s financial services... [Read More]
by RSS Bill Hogan  |  Apr 14, 2017  |  Filed in: Industry Trends & News
Preventing the loss of critical or sensitive data has been an issue for as long as there has been proprietary information and intellectual property. But recent developments both in regulatory requirements and in the evolution of network infrastructures, including BYOD, virtualization, sophisticated applications, shadow IT, and cloud environments, make it imperative that organizations take a new look at how they control and protect critical data. Most of the time, data loss is unintentional, attributed to employees that unknowingly violate security... [Read More]
by RSS Bill McGee  |  Apr 06, 2016  |  Filed in: Industry Trends & News
The non-profit Computing Technology Industry Association (CompTIA) issues a semi-annual study on Trends in IT Security, which looks at what is happening in the security market and ways end users and channel firms should be adjusting to the new security reality. CompTIA interviewed 291 IT channel executives and professions in October 2014. Among the most notable findings is that nearly half of all channel firms (48%) say they do not get inquiries from clients or take action as a result of major security breaches. At least one in three channel... [Read More]
by RSS Esther Shein  |  May 28, 2015  |  Filed in: Industry Trends & News
Preventing an organization's most valuable and critical information from walking out the door is one of the biggest challenges facing IT and security administrators. It's also a pain point that routinely keeps them up at night. Perhaps most of the time, data loss is unintentional, attributed to employees that unknowingly violate security policy or attempt to get around e-mail based security solutions by using a personal Web-based e-mail, IM or online file sharing application to transmit sensitive documents. That said, the consequences of lost... [Read More]
by RSS Stefanie Hoffman  |  Oct 09, 2013  |  Filed in: Security 101
Gone are the days when Application Control was considered a luxury. Or even a kind of security value-add. In fact, it's safe to say, that for any business with an Internet connection the ability to secure and manage applications is not only a necessity but an inherent component of IT infrastructure. That said, Application Control has come a long ways since its inception. And it's had to. Its rapid evolution is driven, in part, by the fact that security solutions for other components in the network have already reached their stride. Many firewalls,... [Read More]
by RSS Stefanie Hoffman  |  Sep 25, 2013  |  Filed in: Security 101
Spam has plagued e-mail users since its inception. Users obtain a brand new e-mail address only to be pummeled with spam and phishing campaigns usually within a matter of hours. Without fail, cybercriminals seem to have access to a never-ending supply of e-mail addresses and other personally identifying information to fuel spam, phishing and malware activities. That isn't by accident. One of the ways cybercriminals can tap into that bottomless well of personally identifying information is through a Directory Harvesting Attack (DHA). "A DHA... [Read More]
by RSS Stefanie Hoffman  |  Jul 31, 2013  |  Filed in: Security 101
While an invaluable communication tool, email remains one of the most effective and reliable threat vectors around. The reason? It still works. It's no secret email is the gateway to sensitive customer information, crucial databases and other valuable data. Attacks that leverage email as the initial point of entry provide lucrative returns for their operators. The email security market has little room to be complacent. Email security continues to evolve to keep up with increasingly sophisticated, multi-faceted threats and counteract stealth malware... [Read More]
by RSS Stefanie Hoffman  |  Jul 30, 2012  |  Filed in: Industry Trends & News
It seems that lately, threats that were once were simply known as “malware” or “viruses” have been elevated to the status of Advanced Persistent Threat (APT), a term that has strategically been used to strike fear in the hearts of consumers. These days, APTs have a much more common presence in the media, and some of the most notorious have included major global threats such as Ghostnet (a botnet deployed in various offices and embassies to monitor the Dalai Lama agenda), Shady RAT (like Ghostnet but with government and global corporate... [Read More]
by RSS Stefanie Hoffman  |  Apr 25, 2012  |  Filed in: Industry Trends & News