Commercial Malware Makes a Comeback in 2016

According to the IBM X-Force Threat Intelligence Index for 2017, commercial malware made a notable comeback in 2016 and remains a top threat in 2017.

The post Commercial Malware Makes a Comeback in 2016 appeared first on Security Intelligence.

Continue reading Commercial Malware Makes a Comeback in 2016

The Current State of IT Resilience

According to a new report, organizations struggled to maintain IT resilience in 2016 due to challenges related to migration, downtime, the cloud and more

The post The Current State of IT Resilience appeared first on Security Intelligence.

Continue reading The Current State of IT Resilience

The CIO Must Take Charge of the Organization’s Application Portfolio

With more businesses turning to SaaS and cloud-based systems, CIOs often lack a proper understanding of the organization’s application portfolio.

The post The CIO Must Take Charge of the Organization’s Application Portfolio appeared first on Security Intelligence.

Continue reading The CIO Must Take Charge of the Organization’s Application Portfolio

Adopting SaaS: Tips and Best Practices for Cloud Transformation

Despite its many cost and efficiency benefits, adopting SaaS can introduce new security issues if not managed and tested according to best practices.

The post Adopting SaaS: Tips and Best Practices for Cloud Transformation appeared first on Security Intelligence.

Continue reading Adopting SaaS: Tips and Best Practices for Cloud Transformation

Migrating Security to the Cloud: A Model for Total Cost of Ownership

When migrating security to the cloud, IT managers must measure the complete total cost of ownership, which includes tangible and intangible costs.

The post Migrating Security to the Cloud: A Model for Total Cost of Ownership appeared first on Security Intelligence.

Continue reading Migrating Security to the Cloud: A Model for Total Cost of Ownership

The Next Wave of Identity Management Must Meet the Goal of One True Identity

The third wave of the internet requires an approach to identity management that recognizes the need to share PII selectively to maximize its value.

The post The Next Wave of Identity Management Must Meet the Goal of One True Identity appeared first on Security Intelligence.

Continue reading The Next Wave of Identity Management Must Meet the Goal of One True Identity