Disposing of your device securely means wiping old data, deauthorizing account access and finding an ecologically sound home for the old device.
To limit the potentially debilitating financial impact of a security breach, many companies opt to take out cyber insurance policies.
To move sensitive data securely to the cloud, establish a data-centric philosophy and approach to security and apply it across all platforms.
CISOs and other business leaders are struggling to maintain regulatory compliance as government agencies continue to devise new, complicated laws.
IBM Security Guardium Certifies New Big Data Security Capabilities on Cloudera and Hortonworks Platforms
IBM Security Guardium took an even deeper dive into big data security by completing its official certification for Cloudera and Hortonworks platforms.
MongoDB offered a set of security best practices to help users protect their databases from cybercriminals looking to exploit misconfigured servers.
IT managers must know what types of data cybercriminals covet to close any security loopholes that might lead to a security breach.
Outgoing employees are motivated by revenge, greed and resentment to abscond with valuable data. A robust exit process is the key to preventing IP theft.
Co-working spaces can help companies maximize productivity, but they can also introduce security concerns if employees are not trained to connect securely.
All access is not created equal. To protect your crown jewels from an insider threat, it's critical to know your data and, more importantly, your users.