January 19, 2018 Reel Talk: Phishing Attacks Not Water Under the Bridge Yet 2 min read - Phishing attacks are still muddying the waters of network security despite an uptick in security awareness. How can companies avoid the hook?
January 17, 2018 Lacking Cloud Security Policies Leave 60 Percent of Data at Risk 3 min read - Just 40 percent of data stored in the cloud is properly encrypted, according to recent research. How do enterprises deal with this wide protection gap in cloud security?
Data Protection January 15, 2018 Companies Around the World are Ramping Up for GDPR — Is Yours? 5 min read - The General Data Protection Regulation (GDPR) will take effect on May 25, 2018, and companies that fail to prepare may face steep fines.
Data Protection December 28, 2017 ADS-B and Aviation Cybersecurity: Should Passengers Be Concerned? 3 min read - ADS-B technology supplements pilots' situational awareness and provides valuable weather data, but it remains to be seen whether it will impact aviation cybersecurity and passengers' data privacy.
Data Protection December 19, 2017 Data Risk Management, Part 1: How to Put Executives in the Driver’s Seat 3 min read - Executives are increasingly viewing data risk management as an area that can reduce costs and increase information security.
Data Protection December 18, 2017 The Data Security Forecast Calls for Zero Trust 3 min read - To successfully implement a zero trust architecture, security teams must invest in data security solutions that continuously monitor access in real time.
Healthcare November 17, 2017 Why Has Health Care Become Such a Target for Cyberattacks? 4 min read - A widespread ransomware attack such as WannaCry can cause problems for any business. For a health care organization, it can cause an utter catastrophe.
Data Protection November 15, 2017 Data Storage and Encryption Should Top the CISO’s To-Do List 4 min read - Before diving head-first into a data storage and encryption strategy, the CISO must decide which solutions best address the organization's unique needs.
November 14, 2017 Mind the Gap With IBM Data Risk Manager: The Data Risk Security Platform for the C-Suite 3 min read - Our sensitive data is exposed to more internal and external threats, heightening the data risk more than ever before.
November 7, 2017 Anonymity Gone Awry: New TorMoil Vulnerability Leaks User IPs 2 min read - A new vulnerability called TorMoil exploits a browser flaw to bypass security relays and expose real IP addresses belonging to Tor users.