Subscribe Archives »

IT Security Opportunities: From Cloud to Analytics

2 hours ago | by Michael Vizard

IT security opportunities continue to proliferate for managed service providers and others in the channel as new tools and processes are developed to address new challenges. Read More »



  • 10 Best Practices for Security, Compliance Monitoring
    The Cloud Security Alliance recently published a new handbook, "The Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy," aimed at helping big data solution providers reduce security and privacy threats that...
  • Caveat Emptor: Security Issues Key in M&A Deals
    It's no secret that safeguarding business and customer data is a big concern for companies. In mergers and acquisitions (M&As) world, cyber-security is a hot button. With nearly 800 data breaches in the United State last year, according to...
  • Making the Case for a Better Cyber Resilience Plan
    Cyber-attacks on companies of all sizes continue to grow, fueling a greater need for businesses to step up their plans to mitigate and recover from these threats. A recent global survey reveals that 66 percent of the 369 business continuity and...
  • 12 Key Facts About SMBs' Cyber-security Needs
    Small and midsize businesses need to understand that no company is too tiny for a cyber-attack or data breach and it doesn't matter what industry they are in. In fact, more than half of SMBs have been subjected to a breach in the last 12 months,...
  • Desperately Seeking Cyber-Security Talent
    It's no surprise the annual 2016 IT Skills and Salary Report from Global Knowledge finds cyber-security talent at the list of IT skills in high demand. As the number of data breaches continues to rise annually, along with rising costs associated...
  • Security Threat Trouble Spots That Emerged in Q1
    New types of TeslaCrypt ransomware, potentially unwanted applications disguised as software updates, adware attacks on network resources, and Java and Microsoft Office vulnerabilities are all creating new security challenges, according to a threat...
  • Security Rises in Importance Among IT Pros
    A new survey from CompTIA underscores the paradox that security solution providers across the channel regularly face. While IT security is a higher priority than in the past, nearly half the 500 IT security professionals surveyed said they believe...
  • Tech Data Creates Dedicated Security Unit
    Tech Data is homing in on security with a new business unit that aims to help solution providers navigate an expanding array of security products and services.
  • 8 Key Facts About Security Risks in Windows Environments
    The growing success rate of cyber-attacks indicates that enterprises are open to security risks in Windows environments, according to a survey by ManageEngine, a vendor of network, server, desktop and application management software. The study,...
  • Distinguishing 'True' Malicious Security Threats
    On average, organizations experience nearly 5,800 suspicious activities monthly, according to a recent survey from cloud security specialist CloudLock that analyzed the daily behavior of 10 million users, 1 billion files and 140,000 cloud apps. One...
  • Intel Security Ups Its Game With Platform Strategy
    Intel Security is offering channel partners various incentives for selling solutions to customers rather than point products.
  • How Security and Regulatory Compliance Differ
    ANALYSIS: Many executives continue to believe that achieving one automatically assures the other. Here's why this is not the case.
  • Putting a Digital Business Value on IT Security
    New research points to increasing concern over IT security among finance and line-of-business executives. A survey of 1,014 senior finance and LOB execs conducted by Cisco Systems finds that not only is there more awareness of IT security within the...
  • How High Are Your Suppliers' Security Standards?
    IT professionals should not underestimate the importance of their business partners and suppliers' security standards, and need to make investments to protect their interactions with others in their supply chain, according to a study conducted for...
  • CompTIA: Make New Processes Part of the 'Security Mix'
    Successful channel partners will focus on three key areas—processes, skills and products—to ensure that they are well-positioned for new opportunities in enterprise security, according to a new CompTIA survey of 400 IT channel...
  • What MSPs, VARs Should Know About Ransomware
    When companies fall victim to ransomware attacks, downtime seems to hurt them more than ransom costs, and the majority of managed service providers and VARs aren't recouping the time and money they spend on wiping and restoring their computer...
  • Why CXOs Need a Better Cyber-security Education
    There are big gaps in cyber-security education and training for C-level executives and board members responsible for protecting their companies from security breaches and attacks, according to a survey conducted by CyberVista and Zogby Analytics....
  • IT, Business Execs See Security Needs Differently
    The fact that IT organizations and C-level business executives are not on the same page when it comes to IT security might not be a surprise to solution providers in the channel. However, a new survey of 1,100 senior executives conducted by The...
  • The Great IT Security Paradox
    On average, the total cost of an IT security breach is closing in on a million dollars. Although large companies have more at stake than smaller ones, fixing the breach only accounts for about 15 percent of the total cost, according to the findings...
  • Five Tips for Keeping Security Costs Down
    Managed service providers can expand their client base by working out ways of limiting costs without sacrificing service. Here are guidelines for doing so.
  • 12 Key Facts About the True Costs of Data Breaches
    Recovering from a breach typically doesn't end with remediation. Lingering impacts, particularly if sensitive financial data is breached, can last from several months to several years, according to a new survey conducted by the SANS Institute and...

Security Archives »


Thanks for your registration, follow us on our social networks to keep up-to-date