Spyware vendor may have helped Ethiopia target journalists – even after it was aware of abuses, researchers say

The Ethiopian government appears again to be using Internet spying tools to attempt to eavesdrop on journalists based in suburban Washington, said security researchers who call such high-tech intrusions a serious threat to human rights and press freedoms worldwide. The journalists, who work for Ethiopian Satellite Television in Alexandria, Va., provide one of the few independent […]

Is Windows Server 2003 destined to be the next Windows XP?

We aren't too far removed from the death of Windows XP -- sure you can still use it, but you do so at your own peril as the operating system is no longer supported by Microsoft (businesses can pay for extended support -- protection money, if you will). That hasn't stopped many individuals, and indeed even businesses, from continuing to run the OS despite potential for disaster. Granted, that may not be huge, but it is still a very real concern. Now Windows Server 2003 faces a similar fate, with an impending date of July 14th, 2015 slated to bring an… [Continue Reading]

What should banks be doing to protect themselves from cybercrime?

When the prolific criminal Willie Sutton was asked why he specifically targeted banks, he purportedly replied: “Because that’s where the money is.” So it’s no surprise that cybercriminals have made banks a focus for online heists. Following the recently reported series of Carbanak cyber-thefts that taken up to a billion dollars from banks worldwide, a […]

Google suffers new cloud outage, promises to be “better prepared”

Google’s cloud platform suffered another outage over the weekend in an incident that seems similar to a more serious brownout that took place last month. Google said the latest outage affecting its Compute Engine, which was first reported by The … Continue reading →

Cyber Insurance: Managing the Risk

  Cyber insurance is a hot topic of many debates today. It is believed to be the long-awaited cure for high-impact security risks, especially in light of constantly evolving privacy legislation and disclosure obligations – but what actually is it? Simply put, cyber insurance is a tool intended to mitigate the loss from information security incidents. The […]… Read More
The post Cyber Insurance: Managing the Risk appeared first on The State of Security.

The email marketing landscape of 2015

Email marketers face numerous challenges, many of which are different today than they have been in past years. Let's take a look at a broad overview of the email marketing world in 2015, based on a recent Relevancy Group survey of email marketing executives, as well as hot areas in which email marketers intend to focus their energy.
Email marketing's complete opportunity remains untapped

Discussion Point: Will File Sharing Replace Your ECM Solution?

Enterprise File Sync and Share (EFSS) is a disruptive technology that burst into the information management space a few years ago. Workers worldwide were quick converts because they were tired of the big, difficult-to-use proprietary enterprise content management systems (ECM). As more workers started using EFSS, more and more analysts and vendors began to discuss the possible demise of ECM. But is that really possible? Compared to ECM systems, EFSS has relatively little functionality.
Read full story...

Follow us on Twitter

Join free newsletter

Customer centricity: what it means for your business and your customers

There has been a seismic shift in the way brands operate in recent years. The traditional “push” approach is being replaced by a more customer-centric model that uses experiences to strengthen relationships through products and services. Born from the desire to put customers at the heart of an organization, what does customer centricity actually mean […]

Pages