The decision to use a third-party vendor or not depends on several factors. Regardless, cloud data security is a crucial part of business planning.
The cloud liberated computing power, applications, and data storage from reliance on specific hardware managed in a specific location. But the Cloud does typically exist in a specific location: a facility somewhere with racks of servers.
Increasingly, corporate work is being carried out on mobile laptops, tablets, and smartphones, and corporate data is being held outside of the company’s own systems.
Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...
Cyber risk leads to financial risk, but cybersecurity is still often thought of as a technical rather than a business problem.
Increased use of cloud applications and other developments are transforming WAN implementations, improving security in the process.
Hackers probably don't look the same way they're portrayed in the media. So, why have the quintessential images of dark, mysterious hackers prevailed?
Most don't think about their telephone system when it comes to securing their network, but VoIP is actually a common vector of attack.
Security information and event management (SIEM) software provides a way to track, integrate, and analyze the vast amount of log data that comes from an organization’s applications and network hardware. Its original value came from compliance reporting, but it is...
An increasingly popular alternative is hiring a managed security service provider (MSSP). What is it and how can it help keep your business secure?