July 13, 2017 Third-Party Contractor Exposes Verizon Customer Data 2 min read - A third-party contractor inadvertently exposed Verizon customer data, including names, phone numbers and PINs belonging to 14 million subscribers.
Data Protection July 7, 2017 Can You Guess the Cost of a Data Breach in the Asia-Pacific? 2 min read - The rapid expansion of the Asia-Pacific economy is presenting new cybersecurity challenges and driving up the cost of a data breach in the region.
Data Protection June 29, 2017 How Hotel Cybersecurity Keeps Guests and Data Secure 2 min read - Hotel cybersecurity is not just about protecting financial data — it extends to guests' physical and digital property, vulnerable endpoints and more.
June 22, 2017 Website Security ‘Honor Roll’ Shows Firms Still Need to Work on Data Protection 2 min read - The OTA "Online Trust Audit and Honor Roll" graded more than 1,000 consumer-facing firms on website security and found that many are simply failing.
Identity & Access June 22, 2017 The Enemy Within: Identifying Insider Threats in Your Organization 2 min read - According to recent research, privileged users and administrators represent the biggest insider threats to any organization's sensitive data.
Security Services June 20, 2017 Know the Odds: The Cost of a Data Breach in 2017 3 min read - According to a recent Ponemon Institute study, the global cost of a data breach decreased by 10 percent between 2016 and 2017.
June 7, 2017 Database Leak Exposes Millions of Car VINs, Puts Customer Security at Risk 2 min read - The personal information of 10 million U.S. car owners was exposed in a massive leak of car VINs, according to researchers at Kromtech Security.
Data Protection June 1, 2017 Big Data Control Frameworks: Have Your Data and Control It Too 3 min read - Under a strong data control framework, vendors provide exceptional analytics tools without requiring owners to relinquish total control of the data.
Healthcare May 5, 2017 Building a Holistic Cyberhealth Immune System 4 min read - The health care security immune system maps to integrated services and products, addressing specific health care concerns and preventing cyberattacks.
May 2, 2017 Malware Campaign Targets Crucial Business Data 2 min read - Organizations across a range of industries are being targeted in a sophisticated campaign that uses malware to put critical information at risk.