Data Protection December 18, 2017 The Data Security Forecast Calls for Zero Trust 3 min read - To successfully implement a zero trust architecture, security teams must invest in data security solutions that continuously monitor access in real time.
Healthcare November 17, 2017 Why Has Health Care Become Such a Target for Cyberattacks? 4 min read - A widespread ransomware attack such as WannaCry can cause problems for any business. For a health care organization, it can cause an utter catastrophe.
Data Protection November 15, 2017 Data Storage and Encryption Should Top the CISO’s To-Do List 4 min read - Before diving head-first into a data storage and encryption strategy, the CISO must decide which solutions best address the organization's unique needs.
November 14, 2017 Mind the Gap With IBM Data Risk Manager: The Data Risk Security Platform for the C-Suite 3 min read - Our sensitive data is exposed to more internal and external threats, heightening the data risk more than ever before.
November 7, 2017 Anonymity Gone Awry: New TorMoil Vulnerability Leaks User IPs 2 min read - A new vulnerability called TorMoil exploits a browser flaw to bypass security relays and expose real IP addresses belonging to Tor users.
October 31, 2017 Catch-All Google Chrome Extension Conducts Wide-Ranging Data Theft 2 min read - A malicious Google Chrome extension dubbed Catch-All is using a simple phishing scheme to commit data theft against users in Brazil.
Intelligence & Analytics October 27, 2017 Investigating IoT Crime in the Age of Connected Devices 3 min read - To fight IoT crime, security professionals must properly classify incidents and connect seemingly disparate strings of evidence.
Data Protection October 23, 2017 Three Tips to Help Your Organization Hit Data Protection Out of the Park 5 min read - Although data protection is crucial to the success of any business, many employees still circumvent security policies they mistakenly deem superfluous.
October 19, 2017 Sniffing Out Snoops to Improve Network Security for Business 2 min read - In a recent survey, security professional and executives admitted to snooping on enterprise data. How can companies improve network security for business?
Incident Response October 18, 2017 How to Increase Transparency and Rebuild Trust After a Data Breach 2 min read - In the wake of a data breach, organizations should strive to be as transparent and responsive as possible to rebuild customer trust.