Blog Posts Tagged with "data breach"

1689b3c5747846ae2dd3297b00fb0acb

The Third Party Threat

February 16, 2017 Added by:Michael Patterson

A data compromise is inevitable for companies wherever it might emanate from. Therefore an organizations’ ability to respond to an incident is key.

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

2017 Cybersecurity Trends Already in Action

February 08, 2017 Added by:Nathan Burke

With each passing year, it seems that newly-uncovered hacks and the number of users impacted grow larger and larger. One big prediction for 2017 that we haven’t seen come true yet is that we'll have a new major breach.

Comments  (0)

Fa053a3185c9b7154992fb4bffe11e76

FriendFinder Breach Highlights the Need for Better Practice in Password Security

January 31, 2017 Added by:Donato Capitella

The FriendFinder Network breach is a perfect example of how poor password storage can exacerbate the impact of a breach and expose accounts to further exploitation.

Comments  (0)

3ca92d8c88e202c2d9e483c539e0899b

The IT Security Flip: Inside More of a Concern than Outside

December 09, 2016 Added by:Ajit Sancheti

About half (49%) of IT security professionals are more concerned about internal threats than external threats.

Comments  (0)

8cfea2767deef845d26a5bde4448bf51

Cybersecurity and Donald Trump: Where Do We Go From Here?

December 02, 2016 Added by:Kasey Cross

Changes are most certainly going to be made to cybersecurity. The election itself was tarnished with security issues that created at the very least tension, and at its pinnacle, a kind of hysteria.

Comments  (0)

370ef523fe9b1e0fd202d26a56e3584a

Holiday Shopping Security Tips for Consumers

December 02, 2016 Added by:Dan Ross

Cyber Monday kicked off a month of great deals for consumers and high profits for online retailers. Unfortunately, this time of the year also offers hackers different ways to launch cyber-attacks, steal information, and compromise devices.

Comments  (0)

C42db1d900b3553c87ca1abc2c4cb0f9

5 Signs You Need to Upgrade Your Legacy IAM

December 02, 2016 Added by:James Litton

A modern identity and access management (IAM) solution is not a multi-year journey anymore.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Security vs. Privacy: Securing Your Critical Information Assets

November 17, 2016 Added by:Steve Durbin

Organizations that sow and fertilize a deeply rooted culture of security are most likely to be resilient and competitive in the face of ongoing threats and challenges.

Comments  (0)

20913c01b73eb72bf3bbd8b570e4dfa4

Securing the Remedy Before the Breach

October 20, 2016 Added by:Eldar Tuvey

Businesses need to put strategic operations in place to ensure they can successfully move forward after a hack has taken place.

Comments  (0)

2271632958e3e89d01a458efe5e003bd

Minimize “Dwell Time” to Cut the Cost of Data Center Breaches

October 20, 2016 Added by:Dave Burton

If enterprises are serious about curtailing the cost of data breaches, it’s time to shift their focus to one of the chief culprits driving up the cost of breaches: dwell time.

Comments  (0)

0133c663c244df033c2eeb2248dfee32

What Elements Are Needed for Security Analytics Success?

August 23, 2016 Added by:Mike Paquette

Not all security analytics solutions are created equal. There are five key characteristics critically important to ensuring that your security analytics are effective and capable of stopping today’s advanced threats.

Comments  (0)

3149cfd3449309d3982042756d81a157

Why Passwords Are the New Exploits

June 28, 2016 Added by:Nick Bilogorskiy

In the age of stolen passwords, compromised credentials are the easiest way in, simpler than phishing, malware or exploits. “Password confirmation” tools are now readily available to find reused passwords matching any website.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Microsoft Blocks Certain Passwords

June 10, 2016 Added by:Dean Wiech

The steps Microsoft is making are definitely a move in the right direction to protect users from potential social hacking with easily guessable passwords.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

Cloud Security Can’t Be Ignored Anymore, Thanks to Millennials

May 09, 2016 Added by:Vanishree Rao

Thanks to digital preferences of millennials, increased digitization and cloudification will drive the demand for cloud security products and services.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Insider Threats in Today's Digital Age

April 05, 2016 Added by:Steve Durbin

Most research on the insider threat focuses on malicious behavior. However, insider negligence and insider accidents comprise a greater and growing proportion of information security incidents. Chief Information Security Officers (CISOs) who limit their thinking to malicious insiders may be gravely miscalculating the risk.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

California Privacy Advocates Urge Defeat of Federal Data Breach Notice Bill

April 14, 2015 Added by:InfosecIsland News

Six California privacy and consumer groups have called on members of the US House Energy and Commerce Committee to oppose federal legislation that would wipe out California's landmark data breach notification laws.

Comments  (0)

Page « < 1 - 2 > »