Executive Roundup: March 5, 2018

0

The Cybersecurity Journal collects and posts the most recent, most important industry articles here on the blog in this bi-weekly series.

5 Reasons That Cryptocurrency Exchanges Are Hacked – And How to Prevent

Bitcoin! Ethereum! Ripple! Do we have your attention yet?

What Would a Mobile Workspace Look Like?

What is a mobile workspace? What does it look like, and what are its characteristics? A more fundamental question is: What is the business need?

Why You Shouldn’t Put Your Faith In ‘Trusted’ Devices

Many forward-thinking companies have recognized the benefits of remote work and have adapted accordingly. However, allowing anywhere, anytime access to corporate data creates new risks that are difficult to address with most security solutions.

New SEC Cybersecurity Guidance For Public Companies

Commenting on this week’s updated guidance from the SEC on how public companies should disclose cyber security risks and breaches, IT security experts commented below.

4 Steps to Harden Your Cloud Environment

According to a recent report from Kaspersky Lab, almost half of enterprises that use the cloud lack a clear understanding of where their data resides and so really don’t know if it is secure.

 

SHARE