A third of IT pros and administrators admitted downloading apps they were not authorized to and ignoring security policies and best practices in order to do their jobs, according to a new survey. [Read More]
Why aren’t more organizations implementing two-factor authentication? In a word: inconvenience. Businesses are afraid of annoying their buyers by demanding multiple passwords or asking them to take an extra action that might spur them into abandoning the sale.
Shortcomings in a cloud providers’ security architecture can trickle down to customers that leverage their services. So what steps should organizations take to retool their security practices for the cloud age?
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
As 2013 wanes, it makes sense take a few steps back and look at the state of the cloud and how it fits into the plans our customers and friends have been sharing with us. As we move through 2014, will your teams be driving new value, or responding to yesterday’s threats?