ChaptersEventsBlog
Get Free Early Access to TAISE Module 3! Sample the Certificate Experience Today!

All Articles

All Articles
Fix Insider Threat with Data Loss Prevention

Blog Published: 12/10/2015

By Rachel Holdgrafer, Business Content Strategist, Code42What do the Mercedes-Benz C Class, teeth whitening strips, the Apple iPhone and personally identifiable information have in common? Each is the item most commonly stolen from its respective category: luxury cars, personal care items, sma...

The Twelve Days of Cyber Plunder

Blog Published: 12/14/2015

By Phillip Marshall, Director of Product Marketing, CryptzoneAs the holiday season approaches, we caution you to take heed of the cyber perils in this familiar holiday tune.While we had a little fun with the verse, this cautionary tale unfortunately rings true for many.On the first day of Chr...

Humans: Still the Weakest Link In the Enterprise Information Security Posture

Blog Published: 12/16/2015

By Rachel Holdgrafer, Business Content Strategist, Code42When it comes to protecting enterprise data, it’s more about understanding processes, procedures and the humans using the system, and less about defending the physical hardware. Seventy-eight percent of respondents to the Ponemon 2015 St...

Smart City Security

Blog Published: 12/17/2015

By Brian Russell, Co-Chair CSA IoT Working GroupGartner defines a smart city as an “urbanized area where multiple sectors cooperate to achieve sustainable outcomes through the analysis of contextual, real time information shared among sector-specific information and operational technology syst...

Predicting Cyber Security Trends in 2016

Blog Published: 12/21/2015

By TK Keanini, Chief Technology Officer, LancopeOne of my annual rituals is to take stock of the cyber security industry and determine what trends and challenges we are likely to see in the coming year. In the ever-evolving cyberspace, technology changes on a daily basis, and attackers are alw...

Code42 CSO says, “Beware the data-stealing Grinch”

Blog Published: 12/22/2015

By Rick Orloff, Chief Security Officer, Code42Historically, corporations viewed security as an overhead expense required to meet regulatory controls and audits. As we head into a new year, we know breaches are inevitable and questions about security and data protection are being asked at a hig...

A Perspective on the Next Big Data Breach

Blog Published: 12/23/2015

By Kevin Beaver, Guest Blogger, LancopeIn looking at the headlines and breach databases, there haven’t been any spectacular, high-visibility incidents in recent weeks. It’s almost as if the criminals are lurking in the weeds, waiting to launch their next attack during the busy, upcoming holida...

Five Ways Your Employees Sidestep Information Security Policies

Blog Published: 12/29/2015

By Susan Richardson, Manager/Content Strategy, Code42A good employee finds ways to overcome roadblocks and get the job done. But in the case of enterprise IT security, good employees may be your biggest threat. In fact, a recent Dell survey found that nearly seventy percent of IT professionals...

Cost of Data Breach, Loss and Remediation

Blog Published: 01/07/2016

By Rachel Holdgrafer, Business Content Strategist, Code42The Ponemon Institute’s 2015 Cost of Data Breach Study: Global Analysis reported that fallout and clean up efforts associated with a data breach cost companies across the globe $3.79 million on average. In the United States, organization...

Increase in Federal Government Cyber Attacks Lays Groundwork for 2016

Blog Published: 01/11/2016

By John Sellers, Vice President/Federal, LancopeAt the end of last year, we looked back and said that 2014 was the year of high profile cyber attacks on the private sector. Target, Michaels, Sony and several healthcare companies and universities were plastered all over the news headlines. So d...

Privileged-Account Attacks Are Behind Every Major Cyber Crime

Blog Published: 01/14/2016

By Susan Richardson, Manager/Content Strategy, Code42It’s unsettling: the people most accountable for an organization’s security are those most likely to compromise it. Privileged user accounts—IT administrators, application developers and C-suite executives—have been the cause of high-profile...

What Is Data Deduplication and Who Cares?

Blog Published: 01/19/2016

By Rachel Holdgrafer, Business Content Strategist, Code42Data deduplication is a critical component of managing the size (and cost) of a continuously growing data store that you will hear about when you research endpoint backup. Intelligent compression or “single-instance storage” eliminates r...

Containers Aren’t New, But Ecosystem Growth Has Driven Development

Blog Published: 01/21/2016

By Thomas Campbell, Container World 2016Containers are getting a fair bit of hype at the moment, and February 2016 will see the first ever event dedicated to both the business and technical advantages of containers take place in Silicon Valley in the US.Here, Container World talks to Kyle Ande...

2015 Breaches Show That Current Cybersecurity Measures Aren’t Enough

Blog Published: 01/22/2016

By Corey Williams, Senior Director/Product Management and Marketing, CentrifyLast year my colleague Chris Webber predicted that "Breach Headlines will Change IT Security Spend." Unfortunately the breach headlines of 2015 were even more striking than most could predict. 2015 breaches involved h...

Serious Cybersecurity Challenges Ahead in 2016

Blog Published: 01/28/2016

By Phillip Marshall, Director of Product Marketing, CryptzoneBy now you’ll have settled into the New Year, looking ahead at what’s to come as we move swiftly through January. However, there are numerous unsettling predictions that mean 2016 is a year of many serious cybersecurity challenges –...

What They’re Not Telling You About Global Deduplication

Blog Published: 01/29/2016

By Rachel Holdgrafer, Business Content Strategist, Code42When it comes to endpoint backup, is global deduplication a valuable differentiator?Not if data security and recovery are your primary objectives.Backup vendors that promote global deduplication say it minimizes the amount of data that m...

You’ve Been the Victim of a Cybercrime. Who You Gonna Call?

Blog Published: 02/02/2016

By Leo Taddeo, ‎Chief Security Officer, CryptzonePart 1 of a 2-part seriesRight now, one of the greatest challenges in the fight against cybercrime is the difficulty we have in creating a meaningful deterrent for hackers.Basically, the number of cybercriminals out there is demonstrably very l...

Improving Data Privacy One Employee at a Time

Blog Published: 02/04/2016

By Rick Orloff, ‎Vice President and Chief Security Officer, Code 42It’s no Hallmark holiday, but here at Code42, Data Privacy Day is kind of a big deal. We think it should be a big deal for your organization, too. It’s a great chance to focus on the biggest security threat in your organization...

Five Surprising Truths from the Cloud Security Alliance’s Latest Survey

Blog Published: 02/08/2016

Survey of 200 it leaders finds that cloud perceptions, it security reporting structures, and cloud security approaches are changingBy Cameron Coles, Senior Product Marketing Manager, Skyhigh NetworksAfter years of IT leaders loudly voicing their concerns about the security of the cloud, trust ...

Can Wanted Cybercriminals Be Stopped?

Blog Published: 02/11/2016

By Leo Taddeo, ‎Chief Security Officer, CryptzonePart 2 of a 2-part seriesI recently wrote about the challenges around cybercrime reporting in the US. Organizations often fail to notify law enforcement after discovering a network intrusion – partly because of a reluctance on their part to adm...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.