A recent survey by cloud security firm RedLock attributed the rise in cloud data leaks to inadequate policies, lack of compliance and other poor practices.
Intellectual property security is crucial to any company's bottom line. IT teams must locate this data, asses its risk and adjust policies accordingly.
A popular fast-food chain and supermarket were recently breached by POS malware. Some of the credit card details had been up for sale for more than a week.
A security breach at the SEC could have serious repercussions, including billions of dollars worth of insider trading.
When responding to a data breach, the CISO must work closely with the legal department to minimize the risks of litigation and reputational damage.
According to IBM X-Force, misconfigured cloud databases accounted for more than 71 percent of reported leaked records so far in 2017.
A risk-focused data management program can help companies identify and protect their prized assets from attackers aiming to steal, publish or destroy them.
A malware researcher uncovered a spamming operation that compromised more than 711 million email addresses, the largest known data breach of its kind.
Several recent studies confirmed that a security breach is often caused by an insider threat, including rogue employees or human error.
To keep up with today's advanced cybercrime landscape, security professionals must take a proactive approach to threat hunting and incident response.