Between the massive amounts of data flowing through a company, the difficulty of managing its IT systems internally, relying on data synchronization and backup services, and the need to be budget conscious, much of this data may reside outside the firewall. But the use of convenient inward-out systems can put your company at risk if not managed properly.
A new Kaspersky report shows criminals are enjoying profit margins of up to 95% on some DDoS attacks. Attackers are also demanding a ransom from a target in return for not launching a DDoS attack, or calling off an ongoing attack. Ben Herzberg from Imperva tells us why you need to pay attention to these stats.
Thinking about adding an acronym to the end of your name to get your foot in the InfoSec door? Rick McElroy, security strategist for Carbon Black, offers direction for those navigating the ever-changing certification game.
With adoption of cloud applications on the rise, organizations need a plan for reducing the risk of shadow IT while allowing their organizations to enjoy the cloud's benefits.
How do you increase your value as a cybersecurity expert and pass the CCSP? Certified Cloud Security Professional Michael Lyman lays out a powerful 7-step plan so you too can master Cloud Security
Just when you thought it was safe to come to the office, your legacy systems have left you to fend for yourself. In this Experts Corner, expert Greg Hoffer explores the challenges associated with leaving legacy systems behind when moving to new business technologies.