Do the established best practices in paid search have merit? In Part 2 of his two-part series, Contributor Josh Dreller examines five more best practices to see if they truly hold up. The post Re-Examining The Top 10 Paid Search…
A targeted attack against Outlook Web Application (OWA) illustrates how far adversaries will go to establish persistent control over the organization’s entire network. As seen in recent breaches, attackers typically use stolen credentials or malware to get a foothold on…
The average U.S. company of 1,000 employees or more spends $15 million a year battling cyber crime, up 20 percent compared to last year, according to a report released today. Attacks involving malicious code, malware, viruses, worms, trojans, and botnets…
The recent spate of data breaches at major U.S. organizations has raised questions about how effective current security tools and approaches are when it comes to dealing with emerging threats. Private and public enterprises have spent tens of billions of…
Only in the computer security world would I get taken to task for saying the defenses you apply should be directly related to the threats you face. That’s exactly what happened after I posted “The No. 1 problem with computer…
Windows still owns the mainstream business PC market, but Apple’s decent toehold on the enterprise market — $25 billion annually, according to CEO Tim Cook — will only grow. You almost certainly already have Macs in your business, connecting to…
When an organization gets hacked, ideally they’ll realize it promptly and warn their users right away. Take crowdfunding site Patreon, which was hacked last Monday and has already informed the world about the problem. Scottrade, an investment brokerage company, is different,…
A data breach at credit bureau Experian may have exposed data from T-Mobile USA on about 15 million U.S. consumers. The data includes names, birth dates, addresses, and Social Security numbers or other forms of identification like drivers’ license numbers,…