Encryption is one of the security linchpins that spans our IT deployments, and is central to keeping us compliant, maintaining proper separation of duties, enforcing security, and providing the artifacts to keep auditors happy. This
What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good...
After deleting data from thousands of publicly accessible MongoDB databases, ransomware groups have started doing the same with Elasticsearch clusters that are accessible from the Internet and are not properly secured.
The HPE Enterprise Secure Key Manager provides a secure, centralized key management solution for data encryption environments, and merges seamlessly into integrated HPE enterprise solutions. Its user guide provides the necessary
Cybercrime is an exponentially growing threat to the world's businesses, governments and citizens. For perpetrators, there is a low risk of prosecution and large potential gain, which doesn't bode well for victims. Estimates of the
Following a massive data breach that affected over one billion Yahoo accounts, users should review the settings of their accounts, clean their mailboxes and turn on additional account security features.
It always happens this time of year, an influx of holiday-related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to...
This USB 3.0 flash drive is designed to keep your files safe. The anodized, aircraft-grade aluminum housing is waterproof to 200 meters, vibration-resistant, and shock-resistant. USB 3.0 means read speeds up to four times faster than...
Replacing traditional antivirus (AV) with advanced endpoint protection (AEP) products may not be the best decision for every organization. If you do decide to switch, determining which AEP product is the best fit can be challenging.
Ajit Sancheti, CEO and co-founder of Preempt, examines best practices each organization and their users must deploy, both in and out of corporate networks, to minimize malicious threats in inconspicuous (and conspicuous) places.