Data Protection April 13, 2017 Life’s a Breach: Dissecting a Year of Devastating Data Breaches 2 min read - The volume and sophistication of data breaches grew dramatically in 2016 as cybercriminals began targeting unstructured data for the first time.
Data Protection April 7, 2017 Take the First Step Toward GDPR Compliance With the Right IBM QRadar App 3 min read - With the right QRadar app, security professionals can get a head start on achieving GDPR compliance before the regulation takes effect in May 2018.
Data Protection March 16, 2017 Five Steps to Protect Your Critical Data From Insider Threats 3 min read - This five-step approach to securing critical data is the most effective way for organizations to protect their crown jewels from insider threats.
March 14, 2017 See No Evil? Facebook Puts the Brakes on Social Data for Surveillance 2 min read - Facebook has updated its privacy policy to stop developers from using social data for surveillance tools — but is this too little, too late?
Intelligence & Analytics March 7, 2017 From Linear to Orbital: Rethinking Defense in Depth 3 min read - Defense in depth uses a layered approach to protecting networks and systems from breaches. It relies on multiple lines of defense to provide redundancy.
February 28, 2017 Cloudflare Bug Creates Customer Data Leak Concerns 2 min read - Customer data could be at risk after a bug at content delivery specialist Cloudflare spilled private information from its clients online.
February 28, 2017 Researchers Detect New Attacks Against MySQL Database 2 min read - Analysts found that MySQL databases had been attacked by a ransomware campaign similar to the one that affected MongoDB databases in January.
Data Protection February 21, 2017 Disposing of Your Device: Don’t Throw the Data Out With the Old PC 4 min read - Disposing of your device securely means wiping old data, deauthorizing account access and finding an ecologically sound home for the old device.
Data Protection February 6, 2017 Is it Time to Buy Cyber Insurance? 2 min read - To limit the potentially debilitating financial impact of a security breach, many companies opt to take out cyber insurance policies.
Data Protection February 3, 2017 Does Security Travel With Your Data? Three Tips for Protecting Cloud-Bound Sensitive Data 3 min read - To move sensitive data securely to the cloud, establish a data-centric philosophy and approach to security and apply it across all platforms.