Atchison Frazer, CMO for KEMP Technologies, talks hackers and other security attacks being a source of server downtime and how you can use ADCs to protect your network(s.)
- By Atchison Frazer
- Mar 05, 2014
Why every company, no matter how big or small, needs to have an emergency response plan in place specifically for cyber attacks.
- By Ginger Hill
- Mar 04, 2014
Cyber criminals are getting smarter about manipulating, stealing and profiting off of others’ identities.
Major SSL vulnerability allows hackers to launch MITM attacks on iOS devices.
- By Ginger Hill
- Feb 24, 2014
New ITIC/KnowBe4 Independent Survey Reveals 53% of businesses are unprepared to deal with hacked or stolen BYOD devices even though 50% indicated company-owned tablets, notebooks & smart phones may have been hacked in last 12 months.
Is your city one of the first in America to host a Bitcoin ATM?
- By Ginger Hill
- Feb 18, 2014
“We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama
- By Ginger Hill
- Feb 13, 2014
“We cannot look back years from now and wonder why we did nothing in the fact of real threats to our security and our economy,” said Obama.
- By Ginger Hill
- Feb 12, 2014
People have been talking about the inevitable rise of cyber security insurance for more than a decade now. Cyber attacks have grown into a significant business risk, and an important component of reducing this type of risk is via transfer through insurance policies.
- By Andrew Braunberg
- Feb 05, 2014
The five golden rules of developing a strong network security strategy for managing vendor access.
- By Jeff Swearingen
- Feb 04, 2014
For about the same price, a smart credential provides a higher level of security, more convenience and far greater functionality than a proximity card. As used on college campuses and in newer access control systems, smart credentials have the ability to manage access, payments and many other functions much more securely.
- By Jeremy Earles
- Feb 01, 2014
The migration of physical security technology to a network platform has made it easier and more convenient for organizations to integrate the various modalities of physical security into a unified configuration to better safeguard their employees, visitors, premises and material/intellectual property.
A strategy for the successful management of vendor remote access.
- By Ginger Hill
- Jan 30, 2014
What to do if your statement has a charge of $9.84 followed by an unfamiliar website URL.
- By Ginger Hill
- Jan 28, 2014
Things you need to do NOW if you have recently shopped at this arts and crafts store.
- By Ginger Hill
- Jan 27, 2014
Even after closing a tab, pop-up window has the ability to record your voice, almost indefinitely, without you even knowing.
- By Ginger Hill
- Jan 22, 2014
Hey Target shoppers! Here's your special of the day to keep your shopping experience at Target out of the hands of the "bad guys."
- By Ginger Hill
- Jan 13, 2014
As the result of recent research and investigation, Target Corp. has upped the number affected by the data breach during the holidays.
- By Ginger Hill
- Jan 10, 2014
Most-read articles of 2103 are about airport security, iPhones, social media, guns, TSA, Android and Homeland Security.
- By Ginger Hill
- Jan 06, 2014