By 09:04 am February 09, 2017
The risks are not simply that a device may be compromised for use in a DDoS or ransomware attack. An unsecured IoT device can provide access by the attack vector allowing entry into the wider network.
By 09:02 am February 02, 2017
Even the strongest IT security doesn’t always “walk the walk” when it comes to the IoT.
By 02:07 pm January 25, 2017
A look at how sensors, devices and analytics are reshaping enterprise at the operational level.
illustration of secure technologies
By 01:00 pm February 29, 2016
(SPONSORED) The average global cost of a data breach as a result of a lost or stolen record is $154.
doctors on a computer
By Verizon 09:28 am February 24, 2016
(SPONSORED) In this age of digital transformation, what is meant by managed services?
hacker on laptop
By Verizon 09:21 am February 24, 2016
(SPONSORED) With the evolving threat landscape, cyberattacks happen every day to every type of enterprise -- with disastrous results.
health apps on smarphone and smartwatch
By Verizon 09:18 am February 24, 2016
(SPONSORED) What is the benefit of approaching healthcare with a Mobile First strategy?
online credit card payment
By 03:00 am February 24, 2016
(SPONSORED) In February 2016, Verizon security team issued an alert regarding an elevated threat level affecting the payment systems within the hospitality industry.
padlock over keyboard
By 03:00 am February 17, 2016
(SPONSORED) This synopsis of the 2015 Protected Health Information Data Breach Report provides an analysis overview of confirmed Protected Health Information (PHI) breaches involving more than 392 million records and 1,931 incidents across 25 countries.
security breach on a laptop
By 03:00 am February 10, 2016
(SPONSORED) For today's organization, managing risks to critical information has become a business priority, not just an IT responsibility. We all know cyberattacks damage reputations, destroy customer trust, and affect revenues.

The Daily Brief Newsletter