Security

Recent Articles

  • 10 Ways Businesses Fail at Insider Threat Detection

    Cost of insider threats Bad Behavior 74% of respondents are primarily concerned about the threat from negligent or malicious employees, but 45% don’t know how much they plan to spend on insider threat technology in the next 12 months. Falling Short 47% of respondents do not have specific knowledge of their spending on insider threats.…

  • Cisco, Elastica Forge Reseller Partnership

    Elastica, a cloud access security provider, and Cisco signed a reseller agreement that adds Elastica’s cloud app security solution to Cisco’s threat-centric security portfolio. The deal bolsters Cisco’s security offering with a cloud access security broker (CASB) portfolio that addresses security and compliance risks associated with cloud application and services adoption. While Cisco gains access…

  • Why Taking the Right Security Measures Matters

    Security measures More Vulnerabilities Than Ever The Common Vulnerabilities and Exposures (CVE) system reported about 9,400 new vulnerabilities, with two-thirds of them involving networks. More Unique Attacks Than Ever Of 1.7 trillion attacks made against intrusion prevention systems, 37 million of them were unique. That’s a 100% increase from 2013. Most Common Exploits The Nuclear,…

  • How MSPs Can Help Medical Firms Protect Their Data

    By Doug Truitt As the health care industry becomes increasingly technologically grounded, the oath taken by medical professionals to “do no harm” should extend to protecting patients’ personal data. For doctors’ offices, pharmacies and other medical facilities, taking precautions to safeguard the sensitive information under their care is not just ethically sound in that it…

  • RSA Shows Partners the Security Ropes

    With the annual RSA security conference set to kick off next week, much of the attention in the channel community naturally turns to security. With demand for IT security expertise at an all-time high, more organizations than ever are looking for external services to help secure their IT environments. The challenge is that creating a…

  • Why IT Channel Firms Need to Bolster Their Security Offerings

    Mobile security Security Headaches Malware and hacking are the top areas of concern for 50% and 49% of business executive and technology professional survey respondents, respectively. Other top areas of concern are privacy (45%), data loss/leakage (40%) and social engineering/phishing (38%). Higher Priority 74% of companies said security is a higher priority today than it…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.