August 25, 2015 Reality Bites: Virtualization Increases Cost of Security Breaches 2 min read - A new study reports that virtualization can significantly increase the cost of recovery after a security breach. Is this the new reality?
August 25, 2015 The Ashley Madison Security Breach: An Affair to Remember? 2 min read - The Ashley Madison security breach has everyone talking, but what's the takeaway from this affair for corporations looking to improve cybersecurity?
Data Protection August 17, 2015 Analyze, Protect, Adapt: Could You Win the Data Security Triple Crown? 4 min read - Winning the Triple Crown of data security means being able to protect your sensitive information while also analyzing and adapting your security practices.
Banking & Finance August 13, 2015 Stock Price May Not Tell the Whole Story About Security Breaches 3 min read - A company's stock price may not be drastically affected by a data breach, but that doesn't mean the impact of a cyber event is small.
Retail July 23, 2015 Building a Loyalty Program That Doesn’t Reward Cybercriminals 2 min read - A loyalty program is framed as a win-win for organizations and their customers, but it can also offer prizes for cybercriminals if not managed properly.
Data Protection July 22, 2015 The Mishandling of Sensitive Data: Do You Really Know What You Don’t Know? 3 min read - Carelessness with data handling creates many unnecessary risks. Here are some examples of this neglect and what you can do about it.
July 15, 2015 Butterfly Effect: Chaos Reigns, From Morpho to Wild Neutron 3 min read - Malware group Butterfly — once called Morpho and Wild Neuton — is after corporate IP. What are the risk factors, and how can companies protect their data?
July 14, 2015 When the Canary Stops: New Bitcoin Mining Hack a Wake-Up Call? 2 min read - A recent cyberattack on a bitcoin mining site has many users wondering: Has the canary sung its final song? Could this be the end of the currency?
June 26, 2015 Researchers Develop Hacking Gear Small Enough to Fit Inside a Pita Sandwich 2 min read - You can pack a lot into the average pita — including enough high-tech equipment to eavesdrop and steal data from nearby laptops, researchers have shown.
Data Protection June 18, 2015 Stealing Bases With Leaked Passwords 2 min read - The St. Louis Cardinals are under investigation for allegedly hacking into and stealing information from one of the Houston Astros' internal databases.