10 Myths and Misconceptions About Industrial Espionage

Industrial espionage is real, it’s common, and it can be very costly for your organization. Don’t fall for the myths around this serious issue. Start preparing for the threat today.

The post 10 Myths and Misconceptions About Industrial Espionage appeared first on Security Intelligence.

Continue reading 10 Myths and Misconceptions About Industrial Espionage

2019 Cloud and Disaster Recovery Survey: 3 Key Takeaways

Since 2015, Unitrends, a leading all-in-one enterprise backup solution provider, has conducted their annual Cloud and Disaster Recovery Survey to gauge the state of data backup across a wide range of organizations. Here are some of the major takeaways … Continue reading 2019 Cloud and Disaster Recovery Survey: 3 Key Takeaways

Securing the Industrial Internet of Things in the Utilities Sector

Reading Time: 4 minutes While the industrial internet of things has clear benefits, IIoT environments also have the potential to expose high-value assets or services to a larger attack surface.

The post Securing the Industrial Internet of Things in the Utilities Sector appeared first on Security Intelligence.

Continue reading Securing the Industrial Internet of Things in the Utilities Sector

How to leverage “Secure Access Workstations” for the Cloud

This is a questions I get fairly often. But before I try to answer, let’s take a step back: We know that attackers typically try to compromise user accounts and then move laterally until they find higher-value credentials. The holy grail in this … Continue reading How to leverage “Secure Access Workstations” for the Cloud

Top 3 Enterprise SaaS Data Protection Trends

Cloud computing has come of age, both in terms of adoption and evolution. In order to get more insight into cloud security and data protection trends, ESG surveyed 370 IT professionals responsible for data protection for their organization. Here are th… Continue reading Top 3 Enterprise SaaS Data Protection Trends

The Evaluation: Stage 4 – Determining the Outcome

Wrapping up this series on evaluating technologies and services is actually fairly simple. Determining the outcome of an evaluation is, in fact, mechanical. That is to say, that you shouldn’t have any emotion or subjectivity in your determination… Continue reading The Evaluation: Stage 4 – Determining the Outcome

Cyber Security FUD – Fear and the Growth of the InfoSec Industry

How many times have you read marketing propaganda for information security products that includes slogans that sound like the following?

“Find out what’s lurking inside your system.”[1]
“With network security, if you’re n… Continue reading Cyber Security FUD – Fear and the Growth of the InfoSec Industry

MakerBot Moves Away From Makers with New Printer

If you’ve been following the desktop 3D printing market for the last couple years, you’re probably aware of the major players right now. Chinese companies like Creality are dominating the entry level market with machines that are priced low enough to border on impulse buys, Prusa Research is iterating on their i3 design and bringing many exciting new features to the mid-range price point, and Ultimaker remains a solid choice for a high-end workhorse if you’ve got the cash. But one name that is conspicuously absent from a “Who’s Who” of 3D printing manufacturers is MakerBot; despite effectively creating the …read more

Continue reading MakerBot Moves Away From Makers with New Printer