About Jennifer LeClaire

Jennifer LeClaire is a veteran technology reporter and Fortune 50 copywriter. IT security magazines she reports for include: CRM Daily, Enterprise Security Today, Microsoft, NetworkWorld, Newsfactor, Sci-Tech Today, and Yahoo!

Follow Jennifer on Twitter @jleclaire

 

By: - Technology Reporter

@jleclaire

Why the MDM Rush?

June 16th, 2014

With mobile devices continuing to drive consumer and enterprise marketplace trends, there is no lack of Mobile Management Device (MDM) vendors to choose from—and one more just entered the market. Lumension just rolled out Lumension Endpoint Management and Security Suite with Mobile Device Management v8.0. What sets it apart from the scores of other vendors? […]



By: - Technology Reporter

@jleclaire

The Real Infosec Employee Shortage

March 19th, 2014

When a company like HP offers up a $250,000 grant to attract IT security workers to the field, you know there’s a backstory. In this case, HP’s Scholarship for Women Studying Information Security (SWSIS) program hopes to prime the pump of IT security workers entering the market. The shortage is real—and critical. The IT security […]



By: - Technology Reporter

@jleclaire

After Target Breach, How Can You Ensure Vendors Aren’t Your Weak Link?

February 20th, 2014

Shocking. That’s one of the best words to describe the feeling among many retail industry watchers when the root of the massive Target breach was determined to be an HVAC contractor. Indeed, news headlines continue to examine all aspects of the story, from the $200 million it cost to replace credit cards, to reports of […]



By: - Technology Reporter

@jleclaire

Is Mobile Shopping Safer This Holiday Season?

November 26th, 2013

With the holiday shopping season upon us, scammers, cyber criminals and other nefarious characters come out of the Internet woodwork. Security experts are warning consumers should be cautious during the holiday shopping season to protect personal and financial data from being compromised. Banks and retailers should also be on high-alert. Consider just a couple of […]



By: - Technology Reporter

@jleclaire

How to Protect Corporate Data from Angry Employees

October 22nd, 2013

Yesterday, I defined the problem … employees, angry, unaware or otherwise dishonest, are a significant threat to your company’s IP. Today we look into how to safeguard the database and other IT assets from internal threats by angry employees. First up is device control. Why make it easy for an employee on their way out […]



By: - Technology Reporter

@jleclaire

Angry Employees and Your Corporate Data

October 21st, 2013

Beyond the Syrian Electronic Army, Anonymous and other hactivists cracking into databases, there is yet another threat—perhaps even a greater threat—to your corporate information: angry employees. Did you know that half of employees who left or lost their jobs in the last 12 months kept confidential corporate data? It’s true. And according to a global […]



By: - Technology Reporter

@jleclaire

Malware Going Rogue

September 16th, 2013

A quick scan of news headlines shows the practical side of cybercrime. As you read this, a fake “Grand Theft Auto V’ torrent is racing to spread its infectious payload. An Advanced Persistent Threat (APT) called NetTraveler is doing its dirty work, most recently via a known Java vulnerability. Fake Xerox emails are delivering malware […]



By: - Technology Reporter

@jleclaire

No, Perimeter Protection is Not Dead

August 1st, 2013

Oracle is offering what it calls some “shocking conclusions” about cybersecurity, but will these conclusions cause any shift in emphasis away from the perimeter for the sake of protecting the database? According to a 110-company Oracle-sponsored survey from IDG Research’s CSO Customer Solutions Group, most IT security resources in today’s enterprise are allocated to protecting […]



By: - Technology Reporter

@jleclaire

To Layer or Integrate? That is the Question

June 27th, 2013

Indeed, the debate over whether to mix a myriad of tools and technologies to create a bulletproof shield that hackers can’t invade or to take an integrated approach to in-depth defense to combat persistent threats is ongoing. But more cyber security analysts are speaking out about the benefits of integration. Also known as layered defense, […]



By: - Technology Reporter

@jleclaire

How to Avoid Dangerous Data Breaches While Outsourcing

May 20th, 2013

There’s plenty of talk about security threats from internal employees—but what about the threats associated with outsourcing? The stats may (or may not) surprise you. Forty-six percent of organizations do not evaluate the security and privacy practices of vendors before sharing sensitive or confidential information, according to a recent study conducted by the Ponemon Institute. […]


By: - Technology Reporter

@jleclaire

New School Cyber Crooks Using Old School Malware Tricks

April 29th, 2013

You can teach old crooks new tricks, but many cyber criminals are discovering that the old tricks are working just fine. Indeed, recent security headlines feature old school malware attacks, like the MiniDuke. And old school botnets with creative new names are bum rushing the Internet. At the same time, reflective memory injection (RMI) attacks, which blend […]


By: - Technology Reporter

@jleclaire

Managing Security Risks in a Virtual Environment

February 4th, 2013

Before virtualization even became an official buzzword, IT industry watchers began pointing to its security risks. Now that virtualization is mainstream, few will come out and say virtual environments are inherently less secure—but there remains a tendency to deploy virtual servers and virtual desktops insecurely. Of course, with that tendency comes the potential for security […]


By: - Technology Reporter

@jleclaire

Getting Creative with Data Privacy Employee Education

January 22nd, 2013

Data Privacy Day is right around the corner, opening the door for enterprises to educate employees on keeping data safe and secure. But here’s the challenge: many employees may think they’ve heard it all before—and others aren’t particularly concerned despite the billions of dollars lost to data theft each year. What’s a concerned employer to […]


By: - Technology Reporter

@jleclaire

Back to School: Keeping Your IT Skills Sharp

August 21st, 2012

It’s back to school time for the kids—and it’s the perfect time to consider sharpening your IT skills. You’ll find continuing education opportunities abound at colleges and universities, but if you are like most Information Technology professionals you don’t have time to make that level of commitment. So what’s a hungry IT security pro to […]


By: - Technology Reporter

@jleclaire

Who’s to Blame for Browser-Based Breaches?

July 31st, 2012

Type the phrase “browser security” into Google News and you’ll get about 74,700 results in .27 seconds. Despite software makers working overtime to beef up security in the web browser, tech analysts continue to implicate the browser in breaches large and small. That may be because, as says Lamar Bailey, director of security research and […]



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com