You probably read about the MLB data breach from earlier this summer involving the Houston Astros reportedly being ‘hacked’ by the St. Louis Cardinals.
You probably read about the MLB data breach from earlier this summer involving the Houston Astros reportedly being ‘hacked’ by the St. Louis Cardinals.
Last month I wrote an article for Entrepreneur.com titled Identify and Stop Rogue Employees Before They Become a Security Threat. The article focused on the rogue employees we detailed in our eBook, The 3 Types of Rogue Employees - and How to Stop Them - the innovative, the bad and the lazy.
Last week, Adobe issued an emergency security patch fixing a critical flaw in its Flash Player that could allow a remote hacker to take complete control of Windows, Mac and Linux computers.
At the end of April we published a couple pieces of content focused on rogue employees, a security threat facing nearly every company in the world. Rogue employees are those fully vetted users inside your company who probably have no malicious intent to cause harm, but end up doing so regardless, for a variety of reasons ranging from laziness to oversights to hoarding access.
Last week, Steven Norton published a blog post to The Wall Street Journal’s CIO Journal about increases in ‘next-gen’ security spending. It was a good post highlighting something that I think most people are aware of - enterprise security threats are very real and more and more enterprises are putting technologies and processes in place to prevent them.
Today I read an article in NetworkWorld entitled “BYOD early adopters cite sticker shock”. I have discussed BYOD with many of our customers and, personally, I can’t buy into it. To explain, here is my take on BYOD, the good, the bad and the ugly.
I have been around Information Technology for 20 years and managing Privileged User Access has always been a challenge.
current_page_num+2: 15 - disabled