Quantcast
Channel: IT security – Identity Week
Browsing latest articles
Browse All 24 View Live

Most IT Pros Don’t Report Their Colleagues When They Catch Them Misbehaving

According to data we’ve sifted from our survey of attendees at RSA Conference 2013, 45% of IT workers have snitched on co-workers they’ve caught breaking corporate IT rules or accessing sensitive...

View Article



Senior Management Must Step Up to Fill IT Security Void

Until now, both IT and senior management have been able to ignore the fundamentals of information security by buying technology recommended by industry analyst firms, as well as by going through make...

View Article

Survey Says: Complicated IT Security Products Put Companies at Risk

69 percent of respondents said they’re not using their IT security products to their full potential. Among this group, 71 percent believe this is putting their company, and possibly customers and...

View Article

4 Out of 5 IT Pros Agree – Employees Deliberately Ignore IT Security Rules

For all of you IT admins and managers privately suspicious that no matter what you do to protect the security of your network, your end-users will thwart you anyway – guess what? Our latest survey...

View Article

Remedy Poor Legacy Security Decisions with These Tips to Improve IT Security...

However, even once you accept the fact that the bad guys are going to get into your network, you can significantly mitigate the damage done. Here are some tips to bolster your organization’s IT...

View Article


InfoSec Policies and Standards

Organizations are giving more priority to development of information security (InfoSec) policies, as protecting their assets is one of the prominent things that needs to be considered. The post InfoSec...

View Article

The Annual Holiday Season IT Implementation Freeze

Criminal hackers and nation-state attackers don’t care what time of year it is. They won’t respect your IT freeze, so continuous security improvement and continuous compliance needs to occur 365 days a...

View Article

2016 IT Security Predictions

For many organizations around the world, 2015 could be called the "Year of the Devastating Data Breach." For vendors of IT security, 2016 will be the “Year of Destruction.” Here are our 2016 IT...

View Article


Security Alerts Are IT Security Theater

User threat intelligence, privileged misuse detection and intrusion detection technologies simply detect the most clumsy and incompetent attackers. The post Security Alerts Are IT Security Theater...

View Article


What the Cybersecurity Industry Can Learn from Elections

If you think about what an election is, you can see that it’s largely about data quality. Millions of people create a few pieces of data each. All that data flows through a multi-layered system and...

View Article
Browsing latest articles
Browse All 24 View Live




Latest Images