Recent developments in the cybersecurity sphere read like a dystopian novel. The devices we use for convenience and entertainment in our homes are being taken over for malicious purposes by forces unknown.
Hacktivists have begun deploying much more organized, sophisticated attacks. These are much less likely to be forgotten by customers, as they are aimed at breaching a company’s security and stealing the data most likely to damage the reputation and credibility of the enterprise or, even worse, air customers’ dirty laundry.
News headlines are filled with enough stories about compromised data security, potentially driving executives away from networked and cloud solutions and back to the proverbial days of stuffing cash in a mattress.
McAfee Labs collected 2.47 million new mobile malware samples in 2013, with 744,000 in the last quarter alone.
April 1, 2014
The mobile malware “zoo” totaled 3.73 million samples at the end of the year. According to McAfee Labs Threats Report, Fourth Quarter 2013, malware can arrive on a mobile device through just about every attack vector, such as downloaded apps, malicious website, spam, malicious SMS messages, and malware-bearing advertisements.
The 2014 RSA Conference this February in San Francisco highlighted the theme of “Threat Intelligence.”
April 1, 2014
Security intelligence and changes in the nature of security risk were driving conversations and solutions at the 2014 RSA Conference – What will your C-Suite want to know?
“Being satisfied with a program now does not mean you will be satisfied with it tomorrow. The threats, attacks, types of attackers are always changing.”
November 5, 2013
“Leadership isabout making the team better than the sum of its parts. Leaders look for people who will bring out the best from others and make the whole team better. Great leaders are force multipliers,” shares Stephen Scharf, the leader at Experian entrusted with protecting the business’ brand and customer information from ever changing and expanding threats.