In the wake of a data breach, organizations should strive to be as transparent and responsive as possible to rebuild customer trust.
At the Cambridge Cyber Summit, IBM Security General Manager Marc van Zadelhoff offered three pieces of advice to help business prepare for a data breach.
A recent survey by cloud security firm RedLock attributed the rise in cloud data leaks to inadequate policies, lack of compliance and other poor practices.
Intellectual property security is crucial to any company's bottom line. IT teams must locate this data, asses its risk and adjust policies accordingly.
A popular fast-food chain and supermarket were recently breached by POS malware. Some of the credit card details had been up for sale for more than a week.
A security breach at the SEC could have serious repercussions, including billions of dollars worth of insider trading.
When responding to a data breach, the CISO must work closely with the legal department to minimize the risks of litigation and reputational damage.
According to IBM X-Force, misconfigured cloud databases accounted for more than 71 percent of reported leaked records so far in 2017.
A risk-focused data management program can help companies identify and protect their prized assets from attackers aiming to steal, publish or destroy them.
A malware researcher uncovered a spamming operation that compromised more than 711 million email addresses, the largest known data breach of its kind.