IT Security Team Staffing Shortages: Managing Risks and Attracting TalentDec 12, 2017, 09:00 AM Ben Gane
A company's C-suite has multiple priorities during this time of year: Getting next year's budget squared away while also ensuring the business is on a path toward its upcoming goals are two items high on this list. Another key element that executives must consider heading into 2018 is staffing their...
Predictions for 2018: zero-day exploits leaked from security agencies, next-level ransomwareDec 11, 2017, 09:11 AM Ben Gane
s 2017 draws to an end, the Bitdefender threat analysis unit is already looking into the upcoming malware developments that will likely emerge in the year to come. Bitdefender experts predict an increase of zero-day exploits leaked from security agencies the world over, and massive changes to the way ransomware operates.
The Ivanti Threat Thursday Update for December 7, 2017: A Skills Gap? Or a Skills Chasm?Dec 11, 2017, 09:00 AM Ben Gane
Greetings and welcome. This week, new survey results indicate the cybersecurity skills gap is persistent, tenacious, and likely growing. Got relevant opinions, reactions, and/or suggestions? Feel free to share. Thanks in advance...
Carriers can transform enterprise infrastructure with 5GDec 8, 2017, 08:55 AM Ben Gane
As enterprises look to equip their workers with rich new functionality, they are increasingly relying on networks to provide resilient low latency connectivity that supports the different requirements of a wide portfolio of enterprise applications. Starting from the relatively simple proposition of hosting...
CONFICKER/ DOWNAD 9 Years After: Examining its Impact on Legacy SystemsDec 8, 2017, 08:49 AM Ben Gane
The banking trojan known as DOWNAD (Detected by Trend Micro as DOWNAD family) first appeared back in 2008, where it managed to be one of the most destructive malware at the time, infecting up to 9 million computers and gaining worldwide notoriety. Despite being nearly a decade old...
The Holiday Shopping Season is no Longer Enough!Dec 8, 2017, 08:45 AM Ben Gane
Not so many years ago, the pervasiveness and affordability of e-commerce unleashed a major havoc. Nevertheless, with the passage of time, business models based solely on online sales have started to experience limitations. Pure players started to lose ground to customers in search of a more...
Are Your Android Apps Invading Your Privacy?Dec 8, 2017, 08:39 AM Ben Gane
Mobile devices are amazing tools that can enrich your life in many ways. Need to solve a problem…? There’s probably an app for that. As these devices mature, and as we weave them into our daily lives more, there is a cost tradeoff that you should be mindful of: “privacy vs convenience.”...
Security the main obstacle to IoT adoption, decision makers sayDec 7, 2017, 12:42 PM Ben Gane
The benefits of Internet of Things (IoT) solutions are widely recognized among IT leaders. Business efficiency, customer experience, and collaboration are among the key areas that typically see an uptick thanks to connected devices. But many decision makers are holding back adoption due to...
Why Your Web Filter Should Not Serve as a Second FirewallDec 7, 2017, 10:00 AM Ben Gane
Every enterprise today should be implementing a layered security strategy that utilizes multiple defensive layers to keep threats at bay. Two of these include a firewall appliance and web filter. At its most basic level, a customary perimeter firewall allows a security admin to open...
Putting the user experience firstDec 6, 2017, 09:00 AM Ben Gane
In the early days of IT, computing departments lived in ivory towers, dispensing reports to users when the mainframe felt like it. As enterprise technology evolved, user needs remained in the back seat, with application development cycles that trickled out new features on an IT department schedule that...