Night Vision: Navigating the Darknet for Improved Threat Intelligence

Chief information security officers (CISOs) and other security leaders have heard the term darknet — and typically avoid it with good reason. When used carefully and securely, however, it is an invaluable source of threat intelligence data. But what’s really available under the surface of obvious online resources? How do…

Read More

How Data Loss Prevention (DLP) Can Help Solve the Insider Threat Problem

Face it, insider threats happen. And odds are you are suffering a data loss, leak or theft even as you read this article. That’s a scary thought. Unfortunately, insider threats are so common that organizations deal every day with data loss events when employees quit, mergers and acquisitions (M&As) are…

Read More

Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk

The circle of life is predictable and short for corporate-owned mobile devices. Aging devices are ideally retired before they become a security or productivity risk, wiped clean and recycled. Disposal is a natural, important part of endpoint management, but it’s often beyond IT’s control. The rise of bring-your-own-device (BYOD) culture…

Read More

The Art of Patch Management

Malware exists to exploit vulnerabilities discovered in software. Patches exist to fix those vulnerabilities. So why do so…Read More