Cloud security has become a point of contention as IT departments struggle with ensuring corporate data is protected and vendors provide assurances that their architectures are safe. Although there is still some debate over whether the cloud is truly secure, a significant number of businesses have a...
Cybercriminal tactics have evolved to not only become more efficient at stealing sensitive data, but better at hiding hacker activity while doing so. A recent white paper by research firm Frost & Sullivan discussed the risk of advanced cyber threats, noting that traditional information security ...
As 2012 draws to a close, many IT professionals are re-examining priorities and setting new goals. A recent InformationWeek survey found that tech decision makers ranked improving information security as their number one goal for the coming year. In response to the survey results, the publication of...
A recent survey of 250 senior IT decision makers in the U.K. found that, although 84 percent claimed they were concerned or very concerned about IT security breaches, 55 percent have not tested the security systems and procedures of cloud vendors. The study, conducted by IT recruitment consultancy R...
It may not be easy to go back and closely look at what went wrong following a data breach. No one wants to be the employee that lost a flash drive or failed to meet a compliance requirement. However, acting within an effective information security framework requires organizations to do exactly that ...