We Need More Than Security Awareness to Combat Insider Threats

When I was new to this industry, I firmly believed that insider threats occurred because people didn’t know how to be safe online.

The post We Need More Than Security Awareness to Combat Insider Threats appeared first on Security Intelligence.

Continue reading We Need More Than Security Awareness to Combat Insider Threats

Shadow IT accounts with weak passwords endanger organizations

63% of enterprise professionals have created at least one account without their IT department being aware of it, and two-thirds of those have created two or more, the results of a recent 1Password survey have revealed. Even more worryingly, only 2.6% o… Continue reading Shadow IT accounts with weak passwords endanger organizations

How IoT devices open a portal for chaos across the network

Shadow IoT devices pose a significant threat to enterprise networks, according to a new report from Infoblox. The report surveyed 2,650 IT professionals across the US, UK, Germany, Spain, the Netherlands and UAE to understand the state of shadow IoT in… Continue reading How IoT devices open a portal for chaos across the network

52% of companies use cloud services that have experienced a breach

Seventy-nine percent of companies store sensitive data in the public cloud, according to a McAfee survey. Anonymized cloud event data showing percentage of files in the cloud with sensitive data While these companies approve an average of 41 cloud serv… Continue reading 52% of companies use cloud services that have experienced a breach

Glass Class: Finding Shadow IT

 
What can help you find what needs protecting in the crowded sea of apps going through your network? Shadow IT Discovery has the answer, with solutions that offer ease of use and visibility into the vulnerabilities present throughout your organiz… Continue reading Glass Class: Finding Shadow IT

When properly managed, shadow IT can benefit your organization

77 percent of IT professionals believe their organizations could earn an edge if company leaders were more collaborative with their businesses to find shadow IT solutions, according to a survey of 1000 US-based IT professionals by Entrust Datacard. As … Continue reading When properly managed, shadow IT can benefit your organization

Appeasing the Oasis of Unknown: Shadow IT Discovery

In a sea of millions of apps, which one is the biggest fish to fry? Firewall and proxy logs catch the traffic of users, but identifying what needs attention in such comprehensive logs can be overwhelming. Shadow IT discovery offers the ability to narr… Continue reading Appeasing the Oasis of Unknown: Shadow IT Discovery

How Cybersecurity Salaries Fit Experience and Specialization

Not too long ago, there was a one-size-fits-all assumption about cybersecurity jobs. Today, jobs are more specialized — with higher cybersecurity salaries to match.

The post How Cybersecurity Salaries Fit Experience and Specialization appeared first on Security Intelligence.

Continue reading How Cybersecurity Salaries Fit Experience and Specialization

Glass Class: The ZScaler and Bitglass Integration

 
With the various tools used in today’s cloud-first world, it could be confusing for organizations to find the correct tools they need to protect sensitive data. In light of this, Bitglass and Zscaler have partnered with each other to provi… Continue reading Glass Class: The ZScaler and Bitglass Integration