The Worst Passwords of 2015

SplashData has announced the 2015 edition of its annual “Worst Passwords List”, which highlights the insecure password habits of Internet users. As you can imagine, passwords such as “123456” and “password” still top the list as the most frequently used passwords. However, the list shows a level of being affected by trends in popular culture, […]

read more

CIO Strategy for Privacy Compliance

Learn to effectively manage, secure and optimize enterprise information. How do you govern and manage information? How do you balance confidentiality, availability and integrity of enterprise information? Information security is essential in the day-to-day operations of enterprises. Enterprises need to ensure the confidentiality and integrity of their information, while simultaneously providing availability to those who […]

read more

Stop The Hacking: 2015 Security Plans

It seems like now-a-days there’s a new headline about some massive corporation being a victim of a cyber security break-in every week. One of the more recent hacks – and definitely most publicized – was Sony’s massive breach. One in-theaters and three un-released movies hit the torrent sites way ahead of schedule. A few days […]

read more

8 Levels of Information Technology Security

“In a world of viruses, malware, and hackers, information security is a big deal. One single method of IT security cannot insure protection of mission-critical data. In the enterprise IT environment, layering multiple tactics and security processes can help close all of the gaps. A visual look at a data center provides us with the […]

read more