Why Your MSSP Should Offer a Secure Cloud Storage Solution?

Many MSSPs (managed security service providers)  currently offer their clients the ability to outsource their firewall, DDoS protection, intrusion detection, and more. Instead of grappling with the expense and effort of building a SOC, hiring trained security personnel, and provisioning the expensive tools needed to define and protect the enterprise perimeter, customers can offload that responsibility to an outside provider.

How to Secure Communication with Your Customers & Prevent Data Leakage

When it comes to data leakage, it doesn't really make a difference whether your business is B2B or B2C—customer communications is still risky business. Selling business-to-business often involves exposing sensitive parts of the enterprise—giving your business customers access to online payment portals, shared drives, and sensitive information like bank account numbers.

U.S. Elections: Big Target for Another Data Breach

It’s a fact – if you do anything online these days the information and the computer systems that you use could be the target of malicious outsiders. This goes for banking transactions, email messages, file exchanges with your Box or DropBox accounts, and, yes, the votes that you cast for your local mayor or even the President of the United States.

Ensuring Your Security Solutions are NIST 800-53 Compliant

In our ongoing series on compliance and security, we've covered the history of information security compliance, compliance regimes in general, and how to prepare for a SOX audit. Now, let's move on to the catchily-named NIST 800-53. This security standard covers all federal organizations, except for those under the purview of the defense agencies, and all non-governmental agencies who wish to work with the U.S. government.

A Timeline of Cyber Security Incidents in the 2016 Election

For most voters, the first intrusion of the prefix "cyber" into the 2016 election occurred in late July, when hackers stole 20,000 emails from the Democratic National Committee and posted them on WikiLeaks.

Secure Data Exchange Unification the Ultimate Protection

“In order to truly counter the threat of data loss, companies need to moderate the exchange of content across the perimeter in a way that largely hasn't been done until now. What enterprises need is a brain, an epicenter, that can moderate data exchange channels across an entire organization.”

SOX Compliance: Too Important to Ignore

SOX compliance, while similar in some respects to both HIPAA and PCI, represents one of the most rigorous compliance standards currently applied to US companies. It is rigorous because it has to be.

Data Exchange in the Rearview Mirror

>

In the course of human history, we’ve managed to discover the most efficient and effective ways of delivering a message. Our language has expanded and our messages have evolved, but for the great majority of recorded history, data exchange remained basic.

2016 Mid-Year Global Review: Cyber Security & Data Breaches

Cyber crime threats continue to be on the minds of corporate executives and individuals across the globe. There are very good reasons that this is the case as media outlets are routinely reporting that cyber crime continues to be on the rise and individuals are constantly receiving notices from “trusted” institutions that they do business with that their information has been stolen.

You've Been Audited —Is your PCI DSS, SOX & HIPAA Compliance in Order?

title="" width="180" height="110"> You're an IT guy, and the auditor is coming tomorrow. Although PCI DSS is different from SOX is different from HIPAA, each of these compliance regimes has a common origin , and covers a similar set of concerns. Here are a few things that you may want to look out for.

Subscribe to Email Updates