Phishing remains one of the top threats to enterprise IT. According to a recent Akamai report, “Phishing Is No Longer Just Email: It’s Social,” phishing is responsible for as many as 93 percent of security breaches. Email phishing attacks continue to rank highest among attack methods, but criminals are now…
Read More
What is an insider threat? Insider threats are users with legitimate access to company assets who use that access, whether maliciously or unintentionally, to cause harm to the business. Insider threats aren’t necessarily current employees, they can also be former employees, contractors or partners who have access to an organization’s…
Read More
Digital transformation isn’t just a matter of luck, perseverance or foresight. Research shows there are many differences between best-of-class enterprises, who are creating revolutionary new operating models, and their peers, who are falling behind. The challenge for enterprises is balancing speed with security and knowing how to roll out innovation…
Read More
What comes to mind when you think of industrial espionage — or economic or corporate espionage? Is it something like foreign spies sneaking into a defense contractor facility to steal fighter jet technology? Of course, that does happen. State-sponsored spying is responsible for the theft of billions of dollars of…
Read More