Blog Posts Tagged with "data breach"

A98c8f7dbb46467b790e2ac1fbbd3f50

Under Expanding Cyber Siege, CISOs Admit Clear Visibility on Attacks Is a Challenge

September 12, 2018 Added by:Liviu Arsene

Increasingly, CISOs recognize that visibility must be relevant if they want to efficiently contain breaches and not waste precious time on a witch-hunt.

Comments  (0)

0b8e9d7009308c174e700bcaf89c4474

Criminal Cyberattacks Are Up. Can Automated Security Help Bring Them Down?

July 26, 2018 Added by:James Lee

Companies that still rely on manual processes – security tools that require frequent tuning or manual CVE patching, for example – fare worse if they are breached.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Every Business Can Have Visibility into Advanced and Sophisticated Attacks

June 18, 2018 Added by:Liviu Arsene

Building a strong security ecosystem is about having both the shield and the sword working together to increase the overall security posture of the organization.

Comments  (0)

D984d097fe7d91c5f11b79f9877ed9bc

Cloud Security Alert – Log Files Are Not the Answer

April 18, 2018 Added by:Lora O'Haver

Once production applications and workloads have been moved to the cloud, re-evaluating the company’s security posture and adjusting the processes used to secure data and applications from cyberattacks are critical next steps.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Centering Your Security Strategy on Leadership, Resilience and Fundamentals

March 16, 2018 Added by:Steve Durbin

Companies that prioritize well-equipped security programs and widespread security awareness are more prepared to grow, innovate and compete.

Comments  (0)

2d356835f3abb8f341fe23f58a2b4fd6

Increasing Board Accountability and Expertise Is Critical to Security and Risk Management

March 09, 2018 Added by:Greg Reber

The Board of Directors (BoD) is ultimately responsible for the future of their company. Shareholders expect that the companies they have invested in will follow through on specific, well-informed plans to mitigate risk in every form.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

The IT Security Lessons from 2017

December 22, 2017 Added by:Avishai Wool

A look at the IT security lessons that can be learned from 2017

Comments  (0)

Abd50ba6fa1aff83aff411c963b09ab5

Putting Off Plans to Strengthen Data Security? It Could Cost You Your Job

December 11, 2017 Added by:Tim Critchley

A cybersecurity incident can adversely affect individuals within an organization, costing an employee their job, career and possibly their future.

Comments  (0)

7fc123e0c16f296ad28a8c3214506aa9

Follow the Money — Stemming Hacker Habits

June 30, 2017 Added by:Steve McGregory

Cybercriminals aren’t stopping anytime soon. Ensure you have a finger on the pulse of your network or be ready to become another notch on a hacker’s belt.

Comments  (0)

9426edcb04ba15a57df6d674f1c74db9

Why Is Digital Property Monitored Less than Physical Property?

March 09, 2017 Added by:Ajit Singh

If we were to place as much emphasis on monitoring events that take place on our IT systems as we do monitoring spending habits and shoplifting, many of the data breaches we hear about today could be largely mitigated.

Comments  (0)

1689b3c5747846ae2dd3297b00fb0acb

The Third Party Threat

February 16, 2017 Added by:Michael Patterson

A data compromise is inevitable for companies wherever it might emanate from. Therefore an organizations’ ability to respond to an incident is key.

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

2017 Cybersecurity Trends Already in Action

February 08, 2017 Added by:Nathan Burke

With each passing year, it seems that newly-uncovered hacks and the number of users impacted grow larger and larger. One big prediction for 2017 that we haven’t seen come true yet is that we'll have a new major breach.

Comments  (0)

Fa053a3185c9b7154992fb4bffe11e76

FriendFinder Breach Highlights the Need for Better Practice in Password Security

January 31, 2017 Added by:Donato Capitella

The FriendFinder Network breach is a perfect example of how poor password storage can exacerbate the impact of a breach and expose accounts to further exploitation.

Comments  (0)

3ca92d8c88e202c2d9e483c539e0899b

The IT Security Flip: Inside More of a Concern than Outside

December 09, 2016 Added by:Ajit Sancheti

About half (49%) of IT security professionals are more concerned about internal threats than external threats.

Comments  (0)

8cfea2767deef845d26a5bde4448bf51

Cybersecurity and Donald Trump: Where Do We Go From Here?

December 02, 2016 Added by:Kasey Cross

Changes are most certainly going to be made to cybersecurity. The election itself was tarnished with security issues that created at the very least tension, and at its pinnacle, a kind of hysteria.

Comments  (0)

370ef523fe9b1e0fd202d26a56e3584a

Holiday Shopping Security Tips for Consumers

December 02, 2016 Added by:Dan Ross

Cyber Monday kicked off a month of great deals for consumers and high profits for online retailers. Unfortunately, this time of the year also offers hackers different ways to launch cyber-attacks, steal information, and compromise devices.

Comments  (0)

Page « < 1 - 2 > »