Top

Tag: Enterprises


Privacy protection, Security

Cyber and Privacy Risks for Real Estate Enterprises

January 31, 2024

Via: SecureWorld

Cyber risk is an existential issue for companies of all sizes and in all industries. The integration of technology and automation, and related collection, use, and sharing of information into everyday business practices presents an enormous opportunity for efficiency and […]


Access control, Security

Attain Insight Security 4X 4.0 strengthens data protection for enterprises

June 30, 2023

Via: Help Net Security

Attain Insight released Attain Insight Security 4X version 4.0, an upgrade to its flagship security software. This latest release introduces new features and enhancements designed to fortify data protection, streamline compliance processes, and bolster user management across diverse enterprise environments. […]


Application security, Security

SaaS subscriptions bouncing back as enterprises seek innovation

September 24, 2021

Via: Help Net Security

Enterprises worldwide continue to migrate from proprietary, licensed software to software-as-a-service (SaaS) subscriptions as they seek innovation, better user experience and lower cost, according to a report published by Information Services Group (ISG). The report on the global market finds […]


Malware

Enterprises Hit with Malware Preinstalled on their Androids

March 14, 2017

Via: Dark Reading

Reports of a pair of isolated mobile malware outbreaks at two large companies yet again calls into question the security of the Android device supply chain. The mobile security research team with Check Point Software Technologies found several dozen devices […]


Data loss

How to Secure Your Enterprise

March 9, 2017

Via: TrendMicro Blog

Over the past decade, the threat landscape has evolved extensively from the beginnings of worms in 2001 to botnets and spyware in 2005. Now, targeted attacks, mobile threats and destructive crypto-ransomware are a daily reality. The damage caused by these […]


Vulnerabilities

Insider threat vs. inside threat: Redefining the term

February 22, 2017

Via: Help Net Security

The traditional meaning of an insider threat is when a current employee or contractor with authorized access to a secure network intentionally or accidently misuses it to carry out a malicious activity. This type of activity can include sabotage, theft, […]


Vulnerabilities

The real problem with the security industry

February 22, 2017

Via: InfoWorld

Ask a security professional about infosec challenges, and you’ll get an earful of complaints about everyone else: Users click on bad links and open attachments, developers release buggy code, IT lags in applying software patches, the C-suite doesn’t understand security […]


Malware

PowerShell threats surge: 95.4 percent of analyzed scripts were malicious

December 9, 2016

Via: Symantec Connect

Malicious PowerShell scripts are on the rise, as attackers are using the framework’s flexibility to download their payloads, traverse through a compromised network, and carry out reconnaissance. Symantec analyzed PowerShell malware samples to find out how much of a danger […]


Vulnerabilities

Company Crown Jewels for Sale: How Espionage as a Service Affects Enterprises

November 29, 2016

Via: TrendMicro Blog

While most enterprises are becoming more aware of threats like ransomware and DDoS attacks, very few know that they are also at risk of economic espionage; much less of associated tools like espionage-as-a-service offerings that attackers can easily avail of […]


Cloud security

Rise in cloud adoption, confusion about managing complex cloud environments

October 31, 2016

Via: Help Net Security

Today’s enterprises are increasingly moving to the cloud to transform internal IT environments, but are struggling to manage the complexity, according to 451 Research and Embotics. More than 75 percent of enterprises are using multiple clouds, including public and private. […]


Cloud security, Network security

DevOps largely failing to improve security, study shows

October 26, 2016

Via: Computer Weekly

Many organizations that are combining application development and systems operations teams are failing to improve security with this DevOps approach, a study has revealed. This is despite the promise of more secure software development by enabling organizations to find and […]


Mobile security

Look to over-the-top services to secure mobile, says specialist

October 5, 2016

Via: Computer Weekly

Mobile network operators should look to 3G and 4G while enterprises should consider OTT services to provide the best security, says telecommunications industry veteran and pioneer Charles Brookson. Enterprises should look to over-the-top (OTT) mobile systems to ensure their mobile […]


Vulnerabilities

When should push come to shove over cyber-security?

July 25, 2016

Via: CSO Online

We live in an era where increasingly sophisticated cyber-criminals are regularly on the prowl for network vulnerabilities. So how can business respond to their slick phishing emails and social engineering ruses? One school of thought within cyber-security circles argues for […]


Access control

Industrialisation of cybercrime is disrupting digital enterprises

July 7, 2016

Via: Help Net Security

Only a fifth of IT decision makers in large multinational corporations are confident that their organization is fully prepared against the threat of cybercriminals. The vast majority of companies feel constrained by regulation, available resources and a dependence on third […]


Email security

Best Practices for Enterprise Email Security

July 1, 2016

Via: InfoSecurity Live

Email security is a major concern in enterprises where transmission and storing of email is snooped by the hackers. The only way to strengthen is to follow the best security practices with respect to the service providers. In the enterprise, […]


Cloud security, Editorial

Hybrid cloud considerations: do you see enterprises being thrilled?

June 22, 2016

Via: Russel Edwards

When two or more clouds (public, private) are bound together, although they remain distinct, a cloud service is called hybrid cloud. The connection between the two or more distinct clouds can concern the location, the dedicated resources or simply the […]


Network security, Vulnerabilities

Knowing the Blind Spots

June 1, 2016

Via: TrendMicro Blog

A a lot of enterprises today are not fully prepared for securing or managing their blind spot “SSL traffic” into the network. Because SSL has traditionally been beyond the reach of network security systems it has become a serious security […]


Network security

Protect your Supply Chain with a Third-Party Risk Management Program

March 16, 2016

Via: TrendMicro Blog

Over the last 20 years, technology advancements, globalization and the Internet have revolutionized business practices and efficiency. Supply chain management is one of the areas that has benefitted most, as companies can now work with suppliers and business partners around […]


Cloud security

Microsoft strengthens security tools for Azure, Office 365

February 29, 2016

Via: InfoSecurity Live

Microsoft has enhanced the holistic agile security platform it touted last November with integrated insights obtained from the company’s intelligent security graph and tighter collaboration with industry partners. The changes highlight Microsoft’s current approach to enterprise security, which focuses on […]


Cloud security

Cloud Security Visibility Gap Dogs Deployments

September 23, 2015

Via: cloud-security

As #enterprises increasingly weave a growing number of outside #cloud providers into the fabric of today’s #it infrastructure, visibility into cloud provider operations and security controls reigns as the number one #cloud security concern, according to a recent survey conducted […]