Microsoft OneDrive

Data breach News

View All News

Data breach Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Data breach Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Data breach

Learn to apply best practices and optimize your operations.

  • Boost built-in IIoT security with VPNs

    Though there are several recommended properties for built-in security, says NCP engineering's Julian Weinberger, encrypting communications with VPNs is essential. Continue Reading

  • Four Windows 10 built-in security features to know

    IT needs an effective plan to maximize security for Windows 10 and get the most out of its built-in features. Continue Reading

  • Cloud security threats in 2018: Get ahead of the storm

    Consistent security for all data from cloud providers and third-party partners is what many consider the next evolution of cloud. The biggest cloud security threats for most companies, however, result from in-house staff mistakes, lack of patching and misconfiguration.

    Even when the risks associated with cloud security threats are high, the cost benefits to organizations outweigh the risks. Enterprise spending for public cloud services worldwide is expected to reach $160 billion in 2018, according to the International Data Corporation. Software as a service still has the highest growth, followed by infrastructure as a service and platform as a service. Many technology platforms take advantage of public cloud security features, but large-scale clouds don't always mean large-scale threat protection. What cloud security threats should you watch out for in 2018?

    "It seems like there's a lot of money to be made in cryptocurrency, and it is so much easier to attack [the internet of things] with Linux malware," said Mounir Hahad, head of threat research at Juniper Networks.

    Botnets increasingly pose cloud security threats, powering distributed denial of service, ransomware and other crippling attacks. Ransomware remains one of the most lucrative for cybercriminals, who can easily find ransomware kits online. In this issue of Information Security magazine, we look at cloud security in 2018 and strategies to protect sensitive data from internal and external threats.

     Continue Reading

View All Manage

Problem Solve Data breach Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve