When responding to a data breach, the CISO must work closely with the legal department to minimize the risks of litigation and reputational damage.
According to IBM X-Force, misconfigured cloud databases accounted for more than 71 percent of reported leaked records so far in 2017.
A risk-focused data management program can help companies identify and protect their prized assets from attackers aiming to steal, publish or destroy them.
A malware researcher uncovered a spamming operation that compromised more than 711 million email addresses, the largest known data breach of its kind.
Several recent studies confirmed that a security breach is often caused by an insider threat, including rogue employees or human error.
To keep up with today's advanced cybercrime landscape, security professionals must take a proactive approach to threat hunting and incident response.
Just like security analysts, top executives need data breach training to develop the skills required to carry out an effective incident response strategy.
Companies and governments around the world must test their cloud security capabilities to keep sensitive data safe from hacktivists and cyber enemies.
Most cybercriminals are after money. To safeguard your network from money-hungry fraudsters, you need to know where your most valuable assets are stored.
Data breaches exposed billions of records in the first half of 2017. The U.S. had the largest number of breaches, but China had the most records exposed.