Quantcast
Channel: InTelligence Blog » Report
Browsing all 177 articles
Browse latest View live

BYOD Feared to Increase Insider Fraud Risk

Recently, Attachemate Corporation and the Ponemon Istitute released the second annual “Risk of Insider Fraud” report indicating that it takes 87 days to first recognize an instance of insider fraud and...

View Article



46% of Organizations Report Stolen Devices

The 2012 Cost of Cyber Crime Study was recently released by Ponemon and HP Enterprise Security highlighting that the cost and frequency of cyber crime have continued to rise for the third year in a...

View Article

Cost of Data Breach Up in 2013 Report

The Ponemon Institute and Symantec recently released the 2013 Global Cost of a Data Breach study indicating that the cost of a data breach went up from $130 per lost record to $136 per lost record. The...

View Article

Absolute Software 2012 Endpoint Security Report

Absolute Software today released the findings of the 2012 Endpoint Security Report revealing that there has been a significant increase in proactive data protection. Following the 2011 Computer Theft...

View Article

Device Theft: Top Cities for Theft; Where They End Up

Absolute Software’s recently released 2012 Endpoint Security Report details device theft insights from the 12,705 investigations we completed in 2012. At the close of 2012, we had recovered more than...

View Article


Cybercrime Up and More Complicated to Resolve

According to the 2013 Cost of Cyber Crime Study conducted by the Ponemon Institute on behalf of HP, the cost, frequency and time to resolve cyber attacks is all on the rise for the 4th year in a row....

View Article

HIPAA Regulations Get Teeth, Report Offers Insight

The U.S. Department of Health and Human Services (HHS) Office for Civil Rights released the HIPAA omnibus final rule last month, implementing a number of provisions of the Health Information Technology...

View Article

Employees Putting Data at Risk: Endpoint Security Can Help

Research released earlier this year from SONY VAIO in their Digital Business Report 2013 shows that employees are acting carelessly with corporate data and corporate devices, putting business “at risk...

View Article


Image may be NSFW.
Clik here to view.

Absolute Software Recognized in Gartner Critical Capabilities for Client...

Absolute Software today announced that Gartner has rated its client management solution, Absolute Manage, in its June 13, 2014 Critical Capabilities for Client Management Tools Report. Gartner gave...

View Article


Image may be NSFW.
Clik here to view.

Absolute Software and Samsung Provide Ideal Solution to Secure and Manage IT...

A little over a year ago, we announced the strategic global partnership between Absolute Software and Samsung Electronics. This partnership has led to the inclusion of patented Absolute persistence...

View Article

Image may be NSFW.
Clik here to view.

How to Protect Business Data from Dangerous Apps

Is your data under threat? I just wrote an article for TechRadar Pro about How to Protect Your Business From Dangerous Apps, talking about how employees could be inadvertently putting sensitive...

View Article

Image may be NSFW.
Clik here to view.

How to Prepare for a Mobile-Friendly Office by 2018

Despite bold moves by companies such as Yahoo to recall remote workers, the general trend is still transitioning toward an increase in remote workers. Currently, roughly 2.6% of the US employee...

View Article

Image may be NSFW.
Clik here to view.

Going Beyond MDM to Address Mobile Threats

Gigaom Research recently released a report entitled “Beyond MDM: what today’s enterprise needs to answer mobile security threats.” The report, written by analyst Michael Finneran, looks at how the...

View Article


Image may be NSFW.
Clik here to view.

Healthcare Compliance Forces IT Security Expertise

I was recently interviewed by HealthITSecurity.com on the topic of Healthcare cybersecurity and compliance and the idea that there are many data breaches that are avoidable. The last few years have...

View Article

Image may be NSFW.
Clik here to view.

Assess Your Enterprise Mobility Programs

Mobility has changed organizations, boosting employee satisfaction and productivity and enabling an unprecedented level of collaboration and communication. With these benefits, enterprises have faced...

View Article


Image may be NSFW.
Clik here to view.

5 Crucial Ways to Protect Corporate Data

Security threats come in more shapes and sizes than ever before. Keeping tabs on all the ways your corporate data could be compromised can feel overwhelming, so I put together a list of the Five Top...

View Article

Image may be NSFW.
Clik here to view.

Target Discloses Final Data Breach Costs: The Takeaway for Organizations

Target was the victim of one of the most highly criticized data breaches in 2013; hackers accessed more than 40 million credit card numbers and 70 million addresses, phone numbers and other personal...

View Article


Image may be NSFW.
Clik here to view.

How the IoT Affects Healthcare

I recently wrote a post for MedCity News about how the Internet of Things is poised to affect the healthcare industry. In “What security worries HIT managers should have about the Internet of...

View Article

Image may be NSFW.
Clik here to view.

A Framework to Assess BYOD

Aragon Research recently put out a Special Report looking at how to maximize the benefits of BYOD. The report, Confronting BYOD, builds upon the concept of of “bring your own workplace,” which urges...

View Article

Image may be NSFW.
Clik here to view.

How to Manage the IoT in Healthcare

I recently wrote a two-part series for MedCity News about how the Internet of Things affects the healthcare industry. In my first post, “What security worries HIT managers should have about the...

View Article
Browsing all 177 articles
Browse latest View live




Latest Images