While American Superconductor's data logs and stores were helpful in convicting Sinovel Wind Group of IP theft, a data loss prevention strategy could have identified the thieves' activities sooner.
The employee exit process often devolves into a fire-drill for IT teams. Having a documented process and a strong relationship with HR can help your team go from reactive to proactive.
Last year, 81% of cyber attacks involved compromised passwords—up from 63% the previous year. How much worse can it get? Let’s not wait around to find out.
The technologies that support Zero Trust are moving into the mainstream. Here's why security experts say it might be the best way to stop data breaches.
Digital transformation and microservices made up the most impactful trends for the enterprise security industry in 2017, but what will have the biggest impact in 2018?
The devices and security measures used throughout an organization play a significant role in enabling safe, efficient remote work. Unfortunately, it can be quite challenging to determine which devices should be granted access to...
The National Institute of Standards and Technology (NIST) has been the voice of consensus and reference material in identity management cybersecurity best practices by outlining the requirements and providing insightful reference...
Organizations doing business with the U.S. Department of Defense (DOD) must demonstrate their ability meet higher levels IT security for their corporate network and systems by Dec. 31, 2017 or risk losing business.
As information pushes further into the cloud, the role of perimeter security is changing. It will become part of a multifaceted solution for network security.