dcsimg

Nine Holiday Security Tips for E-Commerce Retailers

The holidays just might be “the most wonderful time of the year” as the old-time carol says. But for IT security teams that oversee e-commerce websites, the holidays can also be “the scariest time of the year.” … [Read more...]

Is Cyber Insurance Worth the Cost?

Another way to ask this question is, “Do you like to gamble?” That’s usually what the decision to purchase any type of optional insurance comes down to. It’s no different for cyber insurance, which every size business needs to consider. … [Read more...]

Podcast: IT Horror Stories

In this podcast, we hear from a few IT experts about the worst IT nightmares they've ever encountered. … [Read more...]

9 Ways for IT to Plan How to Respond to Natural Disasters

Plan, practice, and then keep on practicing! It sounds so simple, but those are the keys for IT teams who have to respond to a disaster delivered by Mother Nature—whether it’s a flood, fire, earthquake, or a major storm such as a hurricane or tornado. … [Read more...]

4 Myths of PCI Compliance

If your organization is finding it difficult to comply with PCI DSS, the Payment Card Industry Data Security Standard, it could be due to some of the misconceptions about the standard. … [Read more...]

Podcast: Have You Met? Orsenna

We recently had a chance to sit down with Progress' partner, Orsenna, who has been serving WhatsUp Gold customers in Europe. More specifically, Switzerland. … [Read more...]

Podcast: Information Governance Report

When it comes to cost savings for IT operations and businesses in general, information governance is probably the last thing you think of. In this podcast, we discuss the implications of information governance. … [Read more...]

APIs Provide the Data Access Windows for Improving Healthcare

APIs are becoming a huge part of how healthcare organizations provide better care to patients. But what about the security concerns with APIs? … [Read more...]

Top IT Security Certifications to Elevate Your Career

Nobody does IT security better than you and your InfoSec team. You developed a strategic plan that prevents most breaches, and for those that do slip by your perimeter defenses, you have a great tactical plan to identify and mitigate attacks as quickly as possible. You’re a real pro! … [Read more...]

Why Email and EFSS are Insecure

FTP (File Transfer Protocol) has been the standard bearer for sending or moving files too large for email. Today, those file transfers contain the lifeblood of an organization and so Secure FTP is now critical. … [Read more...]