Cloud Security August 18, 2016 Can Cloud Security Decrease Breach Containment Costs? 3 min read - Are cloud security tools worth the investment? It depends the type of tools, how they're configured and how they're implemented.
Data Protection August 16, 2016 As India Gears Up for Cybersecurity Challenges, Threats Are Multiplying 3 min read - India has launched a series of initiatives aimed at overcoming cybersecurity challenges, decreasing costs and battling modern threats.
Data Protection July 26, 2016 The Cost of a Data Breach in India: What You Need to Know 2 min read - Indian companies should implement data security strategies such as encryption and threat sharing to reduce the impact and cost of a data breach.
Identity & Access July 25, 2016 May the Best IAM Program Win: Four Steps to Shoot for the Gold 4 min read - A mature IAM program optimized to a business's objectives and the unique circumstances surrounding it can minimize the risk of data breaches.
Identity & Access July 6, 2016 Not All Heroes Wear Capes: How IAM Can Save You From Your Next Data Breach 2 min read - Identity and access management solutions that incorporate risk-based controls can help organizations avoid a potentially harmful data breach.
Data Protection July 1, 2016 Are You Prepared to Handle the Cost of a Data Breach? 3 min read - The cost of a data breach for organizations in the Asia-Pacific region is rising. Here's what enterprises can do to limit these negative consequences.
Data Protection June 20, 2016 Have a Cost Conversation With Your C-Suite 2 min read - The Ponemon Cost of Data Breach report helps you have a fact-based cost conversation about security with your C-suite or board.
Security Services June 15, 2016 Lessons Learned From 11 Years of Cost of Data Breach Research 2 min read - The Ponemon Institute's annual Cost of Data Breach surveyed 383 organizations to determine the financial impact of a security incident.
Intelligence & Analytics June 14, 2016 Does the Security Industry Have an Immune System Problem? 3 min read - Businesses need to build a cybersecurity immune system where various parts interact and work together to detect, prevent and eradicate breaches.
X-Force June 3, 2016 Compromised Before My Very Eyes: How I Almost Got Hacked 3 min read - Here's the story of how I almost got hacked — and what you can learn from my close call to ensure the data breach doesn't happen to you.