Blog Posts Tagged with "data breach"
Why the Latest Marriott Breach Should Make Us "Stop and Think" About Security Behaviors
April 07, 2020 Added by:Steve Durbin
Marriott International has experienced their second data breach
Comments (0)
When Data Is Currency, Who’s Responsible for Its Security?
February 11, 2020 Added by:Jason Bevis
With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy?
Comments (0)
Today’s Top Public Cloud Security Threats …And How to Thwart Them
June 21, 2019 Added by:Michael Koyfman
In order to thwart exposure, companies must have the capability to look at all cloud environments and perform assessments of how such resources are secured.
Comments (0)
2019 Predictions: What Will Be This Year’s Big Trends in Tech?
January 16, 2019 Added by:Matt Johnson
What will 2019 bring, and how can businesses prepare themselves for the technological developments to come over the next twelve months?
Comments (0)
Cyber Security Lessons from Abroad – Australia’s Essential Eight
November 28, 2018 Added by:Kevin Alexandra
Whitelisting applications and restricting administrative privileges play important roles in helping organisations identify vulnerable assets and set appropriate defences for their networks and applications.
Comments (0)
6 Ways to Use CloudTrail to Improve AWS Security
October 02, 2018 Added by:Sanjay Kalra
Managing security in Amazon Web Services (AWS) is not a set-it-and-forget-it type of proposition.
Comments (0)
Variations in State Data Breach Disclosure Laws Complicate Compliance
September 26, 2018 Added by:John Moran
New data breach notification laws are good news for consumers, better news for attorneys, but not very good news for businesses already struggling to stay on top of a constantly evolving regulatory landscape.
Comments (0)
Under Expanding Cyber Siege, CISOs Admit Clear Visibility on Attacks Is a Challenge
September 12, 2018 Added by:Liviu Arsene
Increasingly, CISOs recognize that visibility must be relevant if they want to efficiently contain breaches and not waste precious time on a witch-hunt.
Comments (0)
Criminal Cyberattacks Are Up. Can Automated Security Help Bring Them Down?
July 26, 2018 Added by:James Lee
Companies that still rely on manual processes – security tools that require frequent tuning or manual CVE patching, for example – fare worse if they are breached.
Comments (0)
Every Business Can Have Visibility into Advanced and Sophisticated Attacks
June 18, 2018 Added by:Liviu Arsene
Building a strong security ecosystem is about having both the shield and the sword working together to increase the overall security posture of the organization.
Comments (0)
Cloud Security Alert – Log Files Are Not the Answer
April 18, 2018 Added by:Lora O'Haver
Once production applications and workloads have been moved to the cloud, re-evaluating the company’s security posture and adjusting the processes used to secure data and applications from cyberattacks are critical next steps.
Comments (0)
Centering Your Security Strategy on Leadership, Resilience and Fundamentals
March 16, 2018 Added by:Steve Durbin
Companies that prioritize well-equipped security programs and widespread security awareness are more prepared to grow, innovate and compete.
Comments (0)
Increasing Board Accountability and Expertise Is Critical to Security and Risk Management
March 09, 2018 Added by:Greg Reber
The Board of Directors (BoD) is ultimately responsible for the future of their company. Shareholders expect that the companies they have invested in will follow through on specific, well-informed plans to mitigate risk in every form.
Comments (0)
The IT Security Lessons from 2017
December 22, 2017 Added by:Avishai Wool
A look at the IT security lessons that can be learned from 2017
Comments (0)
Putting Off Plans to Strengthen Data Security? It Could Cost You Your Job
December 11, 2017 Added by:Tim Critchley
A cybersecurity incident can adversely affect individuals within an organization, costing an employee their job, career and possibly their future.
Comments (0)
Follow the Money — Stemming Hacker Habits
June 30, 2017 Added by:Steve McGregory
Cybercriminals aren’t stopping anytime soon. Ensure you have a finger on the pulse of your network or be ready to become another notch on a hacker’s belt.
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider