July 13, 2017 Third-Party Contractor Exposes Verizon Customer Data 2 min read - A third-party contractor inadvertently exposed Verizon customer data, including names, phone numbers and PINs belonging to 14 million subscribers.
Identity & Access June 13, 2017 Digital Transformation Means Infusing Identity Everywhere 3 min read - A secure digital transformation requires IDaaS solutions that enable IT to support business mandates without compromising the user experience.
Intelligence & Analytics May 26, 2017 Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications 2 min read - Security intelligence solutions such as QRadar UBA enable analysts to detect potentially malicious activity on Microsoft Office 365 cloud-based apps.
Cloud Security May 23, 2017 Zombie Cloud Data: What Your Delete Key May Not Delete 2 min read - Zombie cloud data — information that lingers in the cloud even after a user supposedly deletes it — can open organizations to data theft and noncompliance.
Cloud Security April 28, 2017 Is It Really Safe for FSS Firms to Utilize Hybrid Cloud Services? 3 min read - FSS firms planning to adopt hybrid cloud services must consider the major security challenges and regulatory requirements associated with the technology.
Cloud Security April 26, 2017 Five Questions to Ask Yourself About the Security of Your Cloud Workloads 2 min read - IT professionals must ask themselves tough questions about security to protect their organizations' critical data and hybrid cloud workloads.
Cloud Security March 30, 2017 Do We Need to Worry About Shadow IT? 2 min read - Shadow IT is still a challenge for organizations. Security leaders should provide users with the tools they need and monitor unsanctioned use carefully.
March 27, 2017 The Next Destination for Your Security Operations Is the Cloud 2 min read - Security operations are moving to the cloud, and IT managers are finding ways to support the use of a broad range of business applications on demand.
Cloud Security March 22, 2017 Securing Your Cloud-Based Resources: Start With These Four Areas 3 min read - With cloud-based resources becoming an integral part of the enterprise, it's time for security leaders to recognize the best ways to protect these assets.
March 9, 2017 SGX Malware Extracts RSA Key in Five Minutes 2 min read - Researchers at Graz University of Technology in Austria developed a novel SGX malware attack that can extract an RSA key in under five minutes.