An enterprise security blind spot: Are cybercriminals hiding in your SSL traffic?

SSL traffic is pervasive in today’s enterprises and is expected to grow rapidly over the next several years; according to Gartner, SSL/TLS traffic now comprises 15% to 25% of total web traffic. The problem is the bad guys have noticed.

This report from Venafi examines how enterprises can eliminate the blind spots in SSL traffic, maximise the powers of decryption, and uncover threats.

By Venafi, 19 July 2016, 0 comments Categories: Enterprise, Privacy, Security

Rethinking cyber security: Where does accountability lie?

The many high profile data breaches we have seen splashed across the front pages highlight just how damaging a cyber attack can be on market position, reputation and profits, infiltrating customer data and critical IP. The frequency and success of these attacks also highlights that the existing security strategies of many organisations are dangerously flawed, leaving them wide open to threat, as VMware investigates in this whitepaper downlod.

By VMware, 24 June 2016, 0 comments Categories: Enterprise, Security

The tipping point: Why enterprise security must change

In today's digital world, data is the currency giving businesses the power to act decisively and swiftly, provide rich customer experiences and remain one step ahead of the competition. But as data becomes more valuable, it also becomes more vulnerable.

In this whitepaper, VMware gathered insights from 1,700 IT decision makers and 3,500 office workers from across EMEA and provide 10 important takeaways on the future of enterprise security.

(c)iStock.com/DNY59

By VMware, 24 June 2016, 0 comments Categories: Enterprise, Security

Six steps to effective vulnerability response

The number of vulnerabilities identified in servers, operations systems, applications, and databases has increased at an alarming rate in the past several years—and the outlook going forward is no better. Systems, networks, and applications will continue to be susceptible to vulnerabilities, so it is important to be prepared for response when a vulnerability is identified.

By Alert Logic, 13 May 2015, 0 comments Categories: Security, Vulnerabilities