Subscribe Archives »

Caveat Emptor: Security Issues Key in M&A Deals

1 week ago | by Gina Roos

It's no secret that safeguarding business and customer data is a big concern for companies. In mergers and acquisitions (M&As) world, cyber-security is a hot button. With nearly 800 data breaches... Read More »



  • Security Threat Trouble Spots That Emerged in Q1
    New types of TeslaCrypt ransomware, potentially unwanted applications disguised as software updates, adware attacks on network resources, and Java and Microsoft Office vulnerabilities are all creating new security challenges, according to a threat...
  • Security Rises in Importance Among IT Pros
    A new survey from CompTIA underscores the paradox that security solution providers across the channel regularly face. While IT security is a higher priority than in the past, nearly half the 500 IT security professionals surveyed said they believe...
  • Tech Data Creates Dedicated Security Unit
    Tech Data is homing in on security with a new business unit that aims to help solution providers navigate an expanding array of security products and services.
  • 8 Key Facts About Security Risks in Windows Environments
    The growing success rate of cyber-attacks indicates that enterprises are open to security risks in Windows environments, according to a survey by ManageEngine, a vendor of network, server, desktop and application management software. The study,...
  • Distinguishing 'True' Malicious Security Threats
    On average, organizations experience nearly 5,800 suspicious activities monthly, according to a recent survey from cloud security specialist CloudLock that analyzed the daily behavior of 10 million users, 1 billion files and 140,000 cloud apps. One...
  • Intel Security Ups Its Game With Platform Strategy
    Intel Security is offering channel partners various incentives for selling solutions to customers rather than point products.
  • How Security and Regulatory Compliance Differ
    ANALYSIS: Many executives continue to believe that achieving one automatically assures the other. Here's why this is not the case.
  • Putting a Digital Business Value on IT Security
    New research points to increasing concern over IT security among finance and line-of-business executives. A survey of 1,014 senior finance and LOB execs conducted by Cisco Systems finds that not only is there more awareness of IT security within the...
  • How High Are Your Suppliers' Security Standards?
    IT professionals should not underestimate the importance of their business partners and suppliers' security standards, and need to make investments to protect their interactions with others in their supply chain, according to a study conducted for...
  • CompTIA: Make New Processes Part of the 'Security Mix'
    Successful channel partners will focus on three key areas—processes, skills and products—to ensure that they are well-positioned for new opportunities in enterprise security, according to a new CompTIA survey of 400 IT channel...
  • What MSPs, VARs Should Know About Ransomware
    When companies fall victim to ransomware attacks, downtime seems to hurt them more than ransom costs, and the majority of managed service providers and VARs aren't recouping the time and money they spend on wiping and restoring their computer...
  • Why CXOs Need a Better Cyber-security Education
    There are big gaps in cyber-security education and training for C-level executives and board members responsible for protecting their companies from security breaches and attacks, according to a survey conducted by CyberVista and Zogby Analytics....
  • IT, Business Execs See Security Needs Differently
    The fact that IT organizations and C-level business executives are not on the same page when it comes to IT security might not be a surprise to solution providers in the channel. However, a new survey of 1,100 senior executives conducted by The...
  • The Great IT Security Paradox
    On average, the total cost of an IT security breach is closing in on a million dollars. Although large companies have more at stake than smaller ones, fixing the breach only accounts for about 15 percent of the total cost, according to the findings...
  • Five Tips for Keeping Security Costs Down
    Managed service providers can expand their client base by working out ways of limiting costs without sacrificing service. Here are guidelines for doing so.
  • 12 Key Facts About the True Costs of Data Breaches
    Recovering from a breach typically doesn't end with remediation. Lingering impacts, particularly if sensitive financial data is breached, can last from several months to several years, according to a new survey conducted by the SANS Institute and...
  • Ingram Micro Adds Security Assessment Services
    NEWS BRIEFS: In addition to Ingram Micro's news, this week's briefs cover CloudBolt's partner program, Five9's channel program expansion, and more.
  • Beyond Passwords: Seeking Authentication Options
    The sharp rise in data breaches has prompted organizations to look for better ways to secure their data. The challenge is that not many of them have significant experience or expertise with new authentication technologies. A survey of 308...
  • 12 Important Facts About Insider Security Threats
    The fundamentals matter the most when protecting an organization from insider threats, whether they are accidental or malicious, according to a new report from research and advisory firm Aite Group. The outcome of a data breach is the same, exposing...
  • IT Professionals Step Up Security Protection
    With eight in 10 organizations experiencing IT security incidents in 2015, IT professionals are becoming more proactive about preventing them, according to a new Spiceworks survey of nearly 200 IT pros. By implementing measures ranging from...
  • AVG's New Tech Leader Puts Faith in the Channel
    Fred Gerritse, the new GM for AVG Technologies' business division, discusses what's ahead for the company and the channel.

Security Archives »


Thanks for your registration, follow us on our social networks to keep up-to-date