Fix Insider Threat with Data Loss Prevention
Blog Published: 12/10/2015
By Rachel Holdgrafer, Business Content Strategist, Code42What do the Mercedes-Benz C Class, teeth whitening strips, the Apple iPhone and personally identifiable information have in common? Each is the item most commonly stolen from its respective category: luxury cars, personal care items, sma...
The Twelve Days of Cyber Plunder
Blog Published: 12/14/2015
By Phillip Marshall, Director of Product Marketing, CryptzoneAs the holiday season approaches, we caution you to take heed of the cyber perils in this familiar holiday tune.While we had a little fun with the verse, this cautionary tale unfortunately rings true for many.On the first day of Chr...
Humans: Still the Weakest Link In the Enterprise Information Security Posture
Blog Published: 12/16/2015
By Rachel Holdgrafer, Business Content Strategist, Code42When it comes to protecting enterprise data, it’s more about understanding processes, procedures and the humans using the system, and less about defending the physical hardware. Seventy-eight percent of respondents to the Ponemon 2015 St...
Smart City Security
Blog Published: 12/17/2015
By Brian Russell, Co-Chair CSA IoT Working GroupGartner defines a smart city as an “urbanized area where multiple sectors cooperate to achieve sustainable outcomes through the analysis of contextual, real time information shared among sector-specific information and operational technology syst...
Predicting Cyber Security Trends in 2016
Blog Published: 12/21/2015
By TK Keanini, Chief Technology Officer, LancopeOne of my annual rituals is to take stock of the cyber security industry and determine what trends and challenges we are likely to see in the coming year. In the ever-evolving cyberspace, technology changes on a daily basis, and attackers are alw...
Code42 CSO says, “Beware the data-stealing Grinch”
Blog Published: 12/22/2015
By Rick Orloff, Chief Security Officer, Code42Historically, corporations viewed security as an overhead expense required to meet regulatory controls and audits. As we head into a new year, we know breaches are inevitable and questions about security and data protection are being asked at a hig...
A Perspective on the Next Big Data Breach
Blog Published: 12/23/2015
By Kevin Beaver, Guest Blogger, LancopeIn looking at the headlines and breach databases, there haven’t been any spectacular, high-visibility incidents in recent weeks. It’s almost as if the criminals are lurking in the weeds, waiting to launch their next attack during the busy, upcoming holida...
Five Ways Your Employees Sidestep Information Security Policies
Blog Published: 12/29/2015
By Susan Richardson, Manager/Content Strategy, Code42A good employee finds ways to overcome roadblocks and get the job done. But in the case of enterprise IT security, good employees may be your biggest threat. In fact, a recent Dell survey found that nearly seventy percent of IT professionals...
Cost of Data Breach, Loss and Remediation
Blog Published: 01/07/2016
By Rachel Holdgrafer, Business Content Strategist, Code42The Ponemon Institute’s 2015 Cost of Data Breach Study: Global Analysis reported that fallout and clean up efforts associated with a data breach cost companies across the globe $3.79 million on average. In the United States, organization...
Increase in Federal Government Cyber Attacks Lays Groundwork for 2016
Blog Published: 01/11/2016
By John Sellers, Vice President/Federal, LancopeAt the end of last year, we looked back and said that 2014 was the year of high profile cyber attacks on the private sector. Target, Michaels, Sony and several healthcare companies and universities were plastered all over the news headlines. So d...
Privileged-Account Attacks Are Behind Every Major Cyber Crime
Blog Published: 01/14/2016
By Susan Richardson, Manager/Content Strategy, Code42It’s unsettling: the people most accountable for an organization’s security are those most likely to compromise it. Privileged user accounts—IT administrators, application developers and C-suite executives—have been the cause of high-profile...
What Is Data Deduplication and Who Cares?
Blog Published: 01/19/2016
By Rachel Holdgrafer, Business Content Strategist, Code42Data deduplication is a critical component of managing the size (and cost) of a continuously growing data store that you will hear about when you research endpoint backup. Intelligent compression or “single-instance storage” eliminates r...
Containers Aren’t New, But Ecosystem Growth Has Driven Development
Blog Published: 01/21/2016
By Thomas Campbell, Container World 2016Containers are getting a fair bit of hype at the moment, and February 2016 will see the first ever event dedicated to both the business and technical advantages of containers take place in Silicon Valley in the US.Here, Container World talks to Kyle Ande...
2015 Breaches Show That Current Cybersecurity Measures Aren’t Enough
Blog Published: 01/22/2016
By Corey Williams, Senior Director/Product Management and Marketing, CentrifyLast year my colleague Chris Webber predicted that "Breach Headlines will Change IT Security Spend." Unfortunately the breach headlines of 2015 were even more striking than most could predict. 2015 breaches involved h...
Serious Cybersecurity Challenges Ahead in 2016
Blog Published: 01/28/2016
By Phillip Marshall, Director of Product Marketing, CryptzoneBy now you’ll have settled into the New Year, looking ahead at what’s to come as we move swiftly through January. However, there are numerous unsettling predictions that mean 2016 is a year of many serious cybersecurity challenges –...
What They’re Not Telling You About Global Deduplication
Blog Published: 01/29/2016
By Rachel Holdgrafer, Business Content Strategist, Code42When it comes to endpoint backup, is global deduplication a valuable differentiator?Not if data security and recovery are your primary objectives.Backup vendors that promote global deduplication say it minimizes the amount of data that m...
You’ve Been the Victim of a Cybercrime. Who You Gonna Call?
Blog Published: 02/02/2016
By Leo Taddeo, Chief Security Officer, CryptzonePart 1 of a 2-part seriesRight now, one of the greatest challenges in the fight against cybercrime is the difficulty we have in creating a meaningful deterrent for hackers.Basically, the number of cybercriminals out there is demonstrably very l...
Improving Data Privacy One Employee at a Time
Blog Published: 02/04/2016
By Rick Orloff, Vice President and Chief Security Officer, Code 42It’s no Hallmark holiday, but here at Code42, Data Privacy Day is kind of a big deal. We think it should be a big deal for your organization, too. It’s a great chance to focus on the biggest security threat in your organization...
Five Surprising Truths from the Cloud Security Alliance’s Latest Survey
Blog Published: 02/08/2016
Survey of 200 it leaders finds that cloud perceptions, it security reporting structures, and cloud security approaches are changingBy Cameron Coles, Senior Product Marketing Manager, Skyhigh NetworksAfter years of IT leaders loudly voicing their concerns about the security of the cloud, trust ...
Can Wanted Cybercriminals Be Stopped?
Blog Published: 02/11/2016
By Leo Taddeo, Chief Security Officer, CryptzonePart 2 of a 2-part seriesI recently wrote about the challenges around cybercrime reporting in the US. Organizations often fail to notify law enforcement after discovering a network intrusion – partly because of a reluctance on their part to adm...