After a cyberattack, companies remain vulnerable. What CIOs can do to protect their brands

After a cyberattack, companies remain vulnerable. What CIOs can do to protect their brands

A recent cyberattack on a well-known tech company shows that even when the toughest anti-phishing policies are in place, 70% of companies that attempt email authentication leave the final configuration incomplete. The result is that...

06/07/17

To stop future ransomware hacks, CIOs first need to 'swat the mosquitoes'

To stop future ransomware hacks, CIOs first need to 'swat the mosquitoes'

All too often IT departments can miss the the crucial signs of an incoming ransomware attack. What CIOs can do to avoid becoming the victim of the next global malware hack.

05/23/17

How CIOs can fight the rise in shadow email

How CIOs can fight the rise in shadow email

One feature of today’s cloud-centric landscape is just how many different services may be sending email on your company’s behalf. We call this “shadow email,” and like shadow IT, it lurks in the dark corners of your domain, making...

04/21/17

Load More