Securing Cloud Applications In The Age Of IT Sprawl
Securing Cloud Applications in the Age of IT Sprawl
November 2, 2016

Securing Cloud Applications in the Age of IT Sprawl

The Dropbox breach didn't occur because cybercriminals managed to hack their systems. Instead, hackers stole user credentials to other cloud services and then used their position to access the Dropbox accounts. All the security measures in the world mean nothing…

Read More
Report Shows 4 Biggest Threats To Local Government Information Security
Report shows 4 biggest threats to local government information security
October 26, 2016

Report shows 4 biggest threats to local government information security

Perimeter-focused policies and poor data access management are at the heart of 30 local government organizations' information security problems, according to a recent report from the Office of Missouri State Auditor Nicole Galloway. The audit discovered four practices hackers could…

Read More
How Can Role-based Access Control Protect Retail Payment Systems?
How can role-based access control protect retail payment systems?
October 7, 2016

How can role-based access control protect retail payment systems?

To run responsive, efficient operations, retailers integrate their payment solutions with their back-end inventory systems, e-commerce stores, in-store point-of-sale devices and other assets. Those systems are connected to other applications, many of which may be easy for cybercriminals to compromise.…

Read More