Just a few years ago, the bring-your-own-device (BYOD) to work trend was just starting to give IT administrators cause for concern. Flash forward to today: BYOD has not only reached a tipping point, but is accelerating at a dizzying pace. With this momentum comes elevated fears and a torrent of threats, proven by the latest BYOD and mobility figures from research firm IDC in its Mobile Security Survey 2013.
Access Management: Five Tips
Access management is a crucial function for every organization with an Internet connectionand it’s a lot harder these days. The explosion of remote workers and mobile devices has complicated and confused once-rudimentary access management functions, while the popularity of social media and other Web 2.0 sites have added a more challenging dimension to the work environment.
APTs: One Layer Is Not Enough
One in five security professionals recently surveyed by ISACA say its organization has experienced an advanced persistent threat (APT) attack.
Email, Privacy and You… a Look Inside SB 467
For geeks like me, 1986 was a great year… IBM unveiled their “PC Convertible laptop”, the “first MS-DOS virus, Brain,” was released, and the “Electronic Communications Privacy Act of 1986 (ECPA)” was enacted. And, why is this so important? Because 27 years later, laptops, computer viruses and this piece of legislation all impact just about everyone in one way or another.
HIPAA Omnibus Rule: Should your IT department fret over it? — Part I
Today, the entire healthcare industry is abuzz over the latest development – the HIPAA Omnibus Rule . And all those businesses associated with healthcare providers – in some way or the other – are looking for some answers in that 500+ page proclamation, because certain clauses of the enhanced law have given them new obligations. Early this year, the U.S.
Voices that matter – Identity and Access Management
Lately, the digital identities of users have evolved into playing a significant role in specifying how users interact with computer networks, thus making the IAM programs more and more complex. Identity and Access Management has become one of the most celebrated, and at the same time, dreaded term in IT management. In the present days of cutting-edge technology, IAM has evolved into a branch of science and has been perceived as a very difficult process
Android malware gets phish-y
Last week the security world was abuzz with news of a new attack vector for mobile attacks.
Spamhaus, Cyberbunker and the largest DDoS attack on Record
Botnet owners took a page out of Chef Emeril Legasse’s cookbook and ‘kicked it up a notch’ last week when they launched a massive Distributed Denial of Service (DDoS) attack on Internet spam fighter Spamhaus, content delivery provider CloudFlare and other Internet infrastructure providers. The Spamhaus Project provides blacklisting services to many ISPs and email servers around the world with the intent of stopping the billions of spam emails sent daily
Security 101: Two-Factor Authentication
Time and time again, the old methods of identifying who you are have fallen prey to various attacks and breaches. Simply having a login name and a password, even a strong password – one that doesn’t contain words from the dictionary, and consists of upper case letters, lower case letters, numbers, and special symbols like exclamation points, ampersands or other non-alphanumeric characters – is often no longer strong enough to prevent a breach. You could have an incredibly strong passwo…
DDoS: A Brief History
Distributed-denial-of-service (DDoS) attacks have been the tool of choice for cybercriminals since the dawn of the Internet. Why