A Road Map for Better Government Cybersecurity From North Dakota

Imagine the impact on the government cybersecurity landscape if the mantra for every U.S. state were something like, “Every student, every school, cyber-educated.”

The post A Road Map for Better Government Cybersecurity From North Dakota appeared first on Security Intelligence.

Continue reading A Road Map for Better Government Cybersecurity From North Dakota

Fabian Wosar Joins Me to Chat about Ransomware and Data Privacy

My guest for this episode is Fabian Wosar, CTO of Emsisoft. Emsisoft is a New Zealand-based maker of antimalware and endpoint security solutions that has established itself as a leader in the fight against ransomware. This is a really awesome conversat… Continue reading Fabian Wosar Joins Me to Chat about Ransomware and Data Privacy

How Do You Measure the Success of Your Patch Management Efforts?

With the recent shift in attack focus toward operating systems and the increase in publicized breaches and ransomware attacks, patch management is now essential for organizations.

The post How Do You Measure the Success of Your Patch Management Efforts? appeared first on Security Intelligence.

Continue reading How Do You Measure the Success of Your Patch Management Efforts?

What Is the Biggest Challenge Facing Endpoint Security? Hint: It’s Not Malware

Comprehensive UEM solutions centrally support capabilities for data collection, reporting and alarming, data analysis, and automated response that are the hallmark of responsible endpoint security.

The post What Is the Biggest Challenge Facing Endpoint Security? Hint: It’s Not Malware appeared first on Security Intelligence.

Continue reading What Is the Biggest Challenge Facing Endpoint Security? Hint: It’s Not Malware

Demystifying Security in an Open, Hybrid Multicloud Environment

Among the avalanche of applications across enterprises and the complexity of the modern IT landscape, security needs to embrace the change by adapting to an open, hybrid multicloud environment.

The post Demystifying Security in an Open, Hybrid Multicloud Environment appeared first on Security Intelligence.

Continue reading Demystifying Security in an Open, Hybrid Multicloud Environment

Staying Vigilant About Retail Security Does Not End on Black Friday

As one of the most targeted industries, retailers should be taking measures to build a secure infrastructure ahead of the holidays and keep retail security evolving and maturing all year long.

The post Staying Vigilant About Retail Security Does Not End on Black Friday appeared first on Security Intelligence.

Continue reading Staying Vigilant About Retail Security Does Not End on Black Friday

Buying Tech Gifts for Kids This Year? Here’s How to Keep Children Safe Online

Some tech gifts for kids come with a big price, and it isn’t the one on your credit card bill. Be sure to consider security and the best practices for keeping kids safe online as you shop this year.

The post Buying Tech Gifts for Kids This Year? Here’s How to Keep Children Safe Online appeared first on Security Intelligence.

Continue reading Buying Tech Gifts for Kids This Year? Here’s How to Keep Children Safe Online

When Stalkerware Stalks the Enterprise

Stalkerware is a real problem that can lead to individuals being tracked and stalked via software on their smartphones. It’s also a growing and underappreciated threat to enterprises.

The post When Stalkerware Stalks the Enterprise appeared first on Security Intelligence.

Continue reading When Stalkerware Stalks the Enterprise

Layer Up With a Layered Approach to Email Security This Winter

Email security remains a top priority in 2019 and into the new year. Your best bet to fend off phishing attacks is to layer up with dynamic, data-driven protection.

The post Layer Up With a Layered Approach to Email Security This Winter appeared first on Security Intelligence.

Continue reading Layer Up With a Layered Approach to Email Security This Winter

5 Reasons You’re Spending Too Much Time, Energy and Money on Endpoint Management

Unified endpoint management simplifies administrator tasks, reduces the time it takes to detect and resolve issues, and substantially reduces operational costs.

The post 5 Reasons You’re Spending Too Much Time, Energy and Money on Endpoint Management appeared first on Security Intelligence.

Continue reading 5 Reasons You’re Spending Too Much Time, Energy and Money on Endpoint Management