Friday, April 13, 2018

Tech, growing data sets complicate enterprise cybersecurity strategy

TechTarget
Latest Technology News & Expert Advice     April 13, 2018
TechTarget
Issue Highlights:
Tech, growing data sets complicate enterprise cybersecurity strategy
New tech creates new attack vectors, cybersecurity vulnerabilities
Crypto-agility: Strategies and best practices to get there
How to get the best desktop support SLA bang for your buck
How do attackers build and use phishing kits?
Tech, growing data sets complicate enterprise cybersecurity strategy
Emerging tech has grown companies' data sets and made IT environments increasingly complex. As IT capabilities evolve, enterprise cybersecurity strategy is struggling to keep up.
New tech creates new attack vectors, cybersecurity vulnerabilities
CISO John Germain explains how tech like AI and IoT are revolutionizing business -- and creating new cybersecurity vulnerabilities as data protection is left on the back burner.
Crypto-agility: Strategies and best practices to get there
Staying crypto-agile is vital for data security. Venafi's Paul Turner discusses how to establish crypto-agility and the need for creating an inventory of cryptographic assets.
How to get the best desktop support SLA bang for your buck
IT can save money on its desktop service-level agreements by mixing and matching the level of support to meet the importance of the device.
How do attackers build and use phishing kits?
With attackers looking to maximize their ROI, they are employing what is called a phishing kit to run scam campaigns. In this Ask the Expert, learn how such kits are built.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget

No comments: