Showing 3 results for: July 2014 ×Perspectives ×

Sandboxes May Not Be Much Fun for Your Network

Sandboxing technology operates with a fundamental flaw: A company must first be infected before any action can be taken. In contrast, anti-malware technology can assess and block zero-day exploits, targeted attacks and advanced persistent in real time.

5 Reasons to Go Beyond HIPAA Compliance

When it comes to HIPAA compliance, many organizations are only interested in what they need to do to appease the auditor. But in a sophisticated threat environment, that mindset can invite complacency and trouble. Here are five reasons why health care entities should go beyond HIPAA and place a deeper focus on security.

A Simple Strategy to Make Life Harder for Hackers

With weak passwords contributing to nearly a third of the data breaches Trustwave investigated in 2013, organizations must seek out additional modes of defense against credential-stealing and credential-exploiting attackers. When delivered as cloud and managed based, two-factor authentication is a useful and simple method that can protect both internal and external assets.