Contact Us

1 (800) 723-1166 |

best practices

Homebest practices
Homebest practices

Reducing the Risk of Un-managed Email Accounts

Recent events have exposed a risk that many organizations are not well versed in: the use of personal web or mobile email accounts on the corporate network. These email accounts are often used in the ordinary course of the day without proper attention to the risk.

Why Methodology Matters: Guidelines for Evaluating a Real-World Security Test

In the last year, we have seen security vendors and well-known testing labs go toe-to-toe in headlines, blogs and social media over the methodology used to produce final test results. Claims of flawed methodologies, out-of-date software, improperly configured devices, or solutions unable to access cloud intelligence have been made.

Websense Now a Member of Cloud Security Alliance’s Security, Trust and Assurance Registry (STAR) Registry

Websense is pleased to announce its inclusion on the Cloud Security Alliance (CSA) STAR registry with its completion of the CSA STAR Self Assessment.

Time to Refresh: Overhauling Security Technology and Systems

The recent Websense/Ponemon Institute report gave a number of poignant insights into the minds of security professionals. Possibly most telling of all was the number stating that given the resources and opportunity, they would completely overhaul their security technologies.

Celebrity Photo Data Hack: Lessons for Businesses and Consumers

If you're a fan of Jennifer Lawrence, Kirsten Dunst, Kate Upton and others, you may be aware that some of their sensitive personal photos were apparently leaked online over the weekend.

Black Hat Takeaways, API Security Roundtable: Lessons Learned in API Security

At Black Hat, Zane Lackey (Signals Sciences, Internet Bug Bounty Program), lead a well-attended discussion about the need to be more thoughtful in our design and implementation of APIs.

Time to Refresh? Global Survey Raises Concerns over Security

The last thing you want to hear is that a critical security countermeasure is not fit for purpose, but that is precisely what a significant number of security professionals are saying, in the second instalment of findings from Ponemon Institute's global cybersecurity survey.