Search Results

After President Donald Trump was inaugurated in January 2017, he signed an executive order in May to strengthen cybersecurity of federal networks and critical infrastructure. As part of that, the American Technology Council and Office of American Innovation issued a report on the efforts needed to c...


As it becomes painfully clear that traditional cybersecurity solutions leave gaps, however small, that can be successfully exploited by adversaries, many users take heart when new and promising security solutions emerge. Technologies such as heuristics, deep packet inspection or behavioral analysis ...


Despite spending tens of billions of dollars on cybersecurity, there’s been no shortage of headlines about massive security breaches. But while most security companies focus on how the breach happened, they’re missing a critical part of the story. They’re not talking about what’s being targeted in o...


Traditional security methods are proving futile against today’s highly organized gangs of cyber criminals. Needed: a security solution with centralized controls that responds swifly to real-time threat data — so that your data is protected wherever your people are.


Half of firms won’t be ready for data breach legislation and most are struggling to train staff to improve security practices. Security managers already know first hand about the wide gulf between data-security best practices and employees’ everyday behaviour. Yet a new survey confirms that most ar...