Tag Archive for: Organizations

iPass Mobile Security Report: Half of Organizations Suspect Their Mobile Workers Have Been Hacked in the Last 12 …

  1. iPass Mobile Security Report: Half of Organizations Suspect Their Mobile Workers Have Been Hacked in the Last 12 …  GlobeNewswire (press release)
  2. More than half of organizations suffer mobile attacks  BetaNews
  3. UK Mobile Workers Exposed to Public Wi-Fi Risks  Infosecurity Magazine
  4. Full coverage

mobile security news – read more

Many organizations still stymied by global privacy and security rules – Information Management

Many organizations still stymied by global privacy and security rules
Information Management
While companies generally are aware of and intimidated by global privacy and data security regulations, many fail to properly understand and address necessary organizational changes to comply, according to a recent study by Experian Data Breach …

data breach – Google News

Organizations reporting data breaches quicker to fed agencies – Information Management


Information Management

Organizations reporting data breaches quicker to fed agencies
Information Management
The Department of Health and Human Services' Office for Civil Rights is cracking down on providers that do not report breaches of protected health information in a timely manner. OCR in March started to fine organizations that do not notify federal

and more »

data breach – Google News

Micro-segmentation Projects Span Enterprise Organizations

Micro-segmentation is nothing new, we starting talking about the concept a few years ago, with the onset of software-defined networking technologies like OpenFlow.  More recently, micro-segmentation was most often associated with establishing trusted connections between cloud-based workloads.

Micro-segmentation is simply a new software-based spin on the old practice of network segmentation which organizations have done for years with a variety of technologies – firewalls, VLANs, subnets, switch-based access control lists (ACLs) etc.  In fact, many organizations use a potpourri of some or even all of these technologies.  According to ESG research (note: I am an ESG employee)

To read this article in full or to leave a comment, please click here

Network World Security