Security Today sat down with noted cyber security expert Philip Lieberman to get his insights on today’s top IT security challenges in this 8-minute video interview.
We’ll kick off 2017 with a look back at our five most popular cyber security stories of 2016, as measured by number of visitors.
If you think about what an election is, you can see that it’s largely about data quality. Millions of people create a few pieces of data each. All that data flows through a multi-layered system and ends up being part of a very critical dataset that drives very real world matters. Is there any place where the security and integrity of information is more important?
For many organizations around the world, 2015 could be called the “Year of the Devastating Data Breach.” For vendors of IT security, 2016 will be the “Year of Destruction.” Here are our 2016 IT security predictions.
We sat down with Jonathan Sander, VP of Product Strategy at Lieberman Software, to discuss cyber security best practices that organizations can leverage to protect themselves from cyber attacks, and what we can expect to see in the cyber security industry moving forward.
IT professionals warn their management about looming IT security disasters, but say it’s the executives who fail to take action.
69 percent of respondents said they’re not using their IT security products to their full potential. Among this group, 71 percent believe this is putting their company, and possibly customers and partners, at risk.
At this week’s RSA Conference we’re showing the latest release of our adaptive privilege management platform. We’re demonstrating how to remove excess local accounts and administrative memberships, provide local escalation, and create a moving target for cyber attackers that significantly limits the amount of time they have in your environment.
However, despite the occasional outlandish blunder, most of the IT security mistakes we witness are fairly common and predictable. In our experience, here are the five most frequent information security errors that organizations make:
If you don’t want your company to be the next data breach headline, start with the assumption that every workstation is compromised, and every device connected to the network is infected and under the control of outsiders.