security breach
Summer reading list: modernizing IT and enhancing cybersecurity, plus a view of the bright side
When my children were younger, the first sign of summer—besides the longer days and warmer temperatures—was our annual trip to our local bookstore. We (me included!) always came home from these jaunts with arms full of books. A few were from their school’s ubiquitous “summer reading” list, but many…
[New Cybersecurity Report] How to Stay Ahead of the Latest Cyber Threats in Higher Ed
Twice each year, Cisco threat researchers and technology partners share data and analysis about cybercriminal activity that threatens networks around the globe. The goal of these cybersecurity reports is to arm you with information that can help you stop attackers or mitigate the impact of an attack…
Remembering the small things: IT Security
There are many tasks and responsibilities of the (lone) IT sysadmin, they are sometimes varied, sometimes monotonous. We know what they are without thinking about them, as if they are unwritten commandments, specific to the IT world. Security has featured greatly in the world news over the past few…
NAB 2015 Attendees: Is Your Security Model Threat-Centric?
Cyber-Security: it has always been important for video entertainment companies. But times have changed- now it’s mission critical. Top of mind again this last few days, the events of the last 6 months have proven this point. If cyber-protection is not bullet-proof, any video entertainment company is…
NSS Labs Report on Cyber Resilience Highlights the Need for a New Approach to Security
A few years ago, a point-product security vendor proudly declared their technology was the silver bullet that stopped ALL security threats from penetrating the corporate network. Many of us in the industry raised our collective eyebrows in surprise at such a bold claim. While the naive or inexperien…
3