Blog Posts Tagged with "data breach"


Centering Your Security Strategy on Leadership, Resilience and Fundamentals

March 16, 2018 Added by:Steve Durbin

Companies that prioritize well-equipped security programs and widespread security awareness are more prepared to grow, innovate and compete.

Comments  (0)


Increasing Board Accountability and Expertise Is Critical to Security and Risk Management

March 09, 2018 Added by:Greg Reber

The Board of Directors (BoD) is ultimately responsible for the future of their company. Shareholders expect that the companies they have invested in will follow through on specific, well-informed plans to mitigate risk in every form.

Comments  (0)


The IT Security Lessons from 2017

December 22, 2017 Added by:Avishai Wool

A look at the IT security lessons that can be learned from 2017

Comments  (0)


Putting Off Plans to Strengthen Data Security? It Could Cost You Your Job

December 11, 2017 Added by:Tim Critchley

A cybersecurity incident can adversely affect individuals within an organization, costing an employee their job, career and possibly their future.

Comments  (0)


Follow the Money — Stemming Hacker Habits

June 30, 2017 Added by:Steve McGregory

Cybercriminals aren’t stopping anytime soon. Ensure you have a finger on the pulse of your network or be ready to become another notch on a hacker’s belt.

Comments  (0)


Why Is Digital Property Monitored Less than Physical Property?

March 09, 2017 Added by:Ajit Singh

If we were to place as much emphasis on monitoring events that take place on our IT systems as we do monitoring spending habits and shoplifting, many of the data breaches we hear about today could be largely mitigated.

Comments  (0)


The Third Party Threat

February 16, 2017 Added by:Michael Patterson

A data compromise is inevitable for companies wherever it might emanate from. Therefore an organizations’ ability to respond to an incident is key.

Comments  (0)


2017 Cybersecurity Trends Already in Action

February 08, 2017 Added by:Nathan Burke

With each passing year, it seems that newly-uncovered hacks and the number of users impacted grow larger and larger. One big prediction for 2017 that we haven’t seen come true yet is that we'll have a new major breach.

Comments  (0)


FriendFinder Breach Highlights the Need for Better Practice in Password Security

January 31, 2017 Added by:Donato Capitella

The FriendFinder Network breach is a perfect example of how poor password storage can exacerbate the impact of a breach and expose accounts to further exploitation.

Comments  (0)


The IT Security Flip: Inside More of a Concern than Outside

December 09, 2016 Added by:Ajit Sancheti

About half (49%) of IT security professionals are more concerned about internal threats than external threats.

Comments  (0)


Cybersecurity and Donald Trump: Where Do We Go From Here?

December 02, 2016 Added by:Kasey Cross

Changes are most certainly going to be made to cybersecurity. The election itself was tarnished with security issues that created at the very least tension, and at its pinnacle, a kind of hysteria.

Comments  (0)


Holiday Shopping Security Tips for Consumers

December 02, 2016 Added by:Dan Ross

Cyber Monday kicked off a month of great deals for consumers and high profits for online retailers. Unfortunately, this time of the year also offers hackers different ways to launch cyber-attacks, steal information, and compromise devices.

Comments  (0)


5 Signs You Need to Upgrade Your Legacy IAM

December 02, 2016 Added by:James Litton

A modern identity and access management (IAM) solution is not a multi-year journey anymore.

Comments  (0)


Security vs. Privacy: Securing Your Critical Information Assets

November 17, 2016 Added by:Steve Durbin

Organizations that sow and fertilize a deeply rooted culture of security are most likely to be resilient and competitive in the face of ongoing threats and challenges.

Comments  (0)


Securing the Remedy Before the Breach

October 20, 2016 Added by:Eldar Tuvey

Businesses need to put strategic operations in place to ensure they can successfully move forward after a hack has taken place.

Comments  (0)


Minimize “Dwell Time” to Cut the Cost of Data Center Breaches

October 20, 2016 Added by:Dave Burton

If enterprises are serious about curtailing the cost of data breaches, it’s time to shift their focus to one of the chief culprits driving up the cost of breaches: dwell time.

Comments  (0)

Page « < 1 - 2 > »
Most Liked