Spamhaus Shows What's Next For Block Listing
Commentary | 11/22/2013 | The broad, silent acceptance of a recent Spamhaus blocking action is a strong indicator that the rules have changed in the battle over spam and other kinds of email abuse.
BYOD: 'We Have Met the Enemy & He Is Us'
Commentary | 11/18/2013 | As smartphone adoption continues at an unrelenting pace, the issues surrounding BYOD will become an even more challenging mobile security management issue.
4 Lessons From MongoHQ Data Breach
Security experts urge companies to implement two-factor authentication, VPNs, and graduated permission levels to better protect customer data from hackers.
Secure Your Network From Modern Hazards
Commentary | 11/15/2013 | Traditional security measures don't stand a chance in a data-centric world. But within the crisis lie opportunities for IT security pros.
Higher Ed Must Lock Down Data Security
Commentary | 11/15/2013 | Higher education rivals only the healthcare industry in housing personally identifiable data. Consider these tactics for smart planning.
The Emergence of DDoS-as-a-Service
Commentary | 11/13/2013 | "Legitimized" services increase DDoS threats and lend credence to the notion that information security is as much about corporate health as it is self-defense.
Report: Social Media Gets Abused
Quick Hits | 11/12/2013 | New data culled from real-world branded social media accounts shows cybercriminals' obsession with going social
|