Digital criminals tried to impersonate oil and gas companies in a recent attack campaign distributing Shade ransomware.
Depending on your needs, you can develop encryption solutions based on open standards from components you build and run yourself or source them as managed services from cloud providers.
Statistically, you're probably not. Even those with cyber insurance often have policies that leave them exposed to certain types of breaches, regulatory fines and real-world financial losses.
The email provider VFEmail suffered a "catastrophic" hack that destroyed the company's primary and backup data servers in the U.S.
Organizations that do not establish a security-first culture will struggle to deliver on their customer-first initiatives.
As the internet of things (IoT) takes over the world, IoT security remains, well, pitiful. Organizations are failing to ensure that the networks and data generated by IoT devices remain protected.
In 2018, data protection became top of mind for organizations around the world. What lessons can we draw from to help improve regulatory compliance, data breach protection and risk management in 2019?
The onus to meet the challenge of consumers' security and privacy expectations is on the enterprise. Developing a security plan around consumer concerns is a good first step.
A good remote work policy covers a broad range of categories, from employment rules to expense reporting to legal obligations. But the data security provisions are probably the most important.
Failure to consider security when developing a hybrid cloud can lead to unanticipated problems that don't exist in typical technology infrastructure.