It's that time of year again — the bustling holiday season when millions of consumers search for, click on and buy gifts for their loved ones online. Despite the impressive ease of doing so in 2013, a now ubiquitous mass of digital shoppers face the mounting threat of cyber attacks and phishing scams from increasingly efficient hackers attempting to steal credit card information and siphon money. See the staggering statistics below and familiarize yourself with the risks of online shopping.
Data security is a huge issue for any business today, as hackers have become increasingly sophisticated and, in many cases, their attacks are able to go completely undetected. The reasons individual companies experience security breaches vary from failing to follow standard safety protocols, to employees unknowingly aiding the attackers in their crimes. Business leaders would be wise to learn from the mistakes of their peers and not make the major security gaffes that the following organizations have made:
One of most interesting parts of my job at Blue Coat, is seeing firsthand the ebb and flow of new technologies as they enter and leave the security market. It’s fascinating to witness the diversity and richness that this technology segment has to offer, and one that I feel is still unmatched. This is due in part to the rampant pace of IT security, and of course, with that ferocity comes incredible technology innovation.
How safe is your social network? Checking your "Social Security" - What are you doing to protect your information?
It’s no secret that threats keep evolving. Today’s advanced threats are increasingly sophisticated, diverse, targeted, aggressive…and successful. Security breaches still happen at an alarming rate, despite the fact that security technologies and processes keep evolving too.
So, what’s the secret to effective protection against today’s advanced threats?
Malware authors are clever, patient, well-funded, and relentless adversaries. They won’t stop until they achieve their objectives. If you’ve got data that they want, no defenses seemingly will prove sufficient. If you lock a door, they’ll come in a window. If you block the window, they’ll come down the chimney. If you plug the chimney, they’ll tunnel under the house. In the ever-escalating cyber arms race between attackers and security practitioners, layered defenses abound, b
Over the last few weeks, Sony has taken some heat for issues with its PlayStation network as users struggled to download the hugely popular game Grand Theft Auto V (GTA V). First released on September 17th, the game has been a well-publicized success with the latest release bringing in more than $1 billion in revenue in just the first three days of availability.
Today’s complex web environment is driving the need for a web security infrastructure with greater levels of performance and capacity.
Everyone is talking about the latest iOS 7 update and not just because of its slick new features and graphical user interface. When the update became available last week, it created a major traffic jam on the Web. Based on our data from appliances deployed around the world, in the five days following the release of the iOS update, customers saw a 265 percent increase in Apple.com traffic compared to the five days before.
When I spoke with various enterprise customers a year ago, many were interested in adopting mobile device initiatives but were trying to understand how to best secure them. The primary concern was loss or theft of the device and the corporate information that resided on it. As a result, most customers turned to Mobile Device Management solutions as a default choice. This allowed them to give their employees the freedom that mobile devices offered while mitigating the risk of data falling into the wrong hands.