Data Protection July 17, 2015 Do You Have Imperfect Data Security? Three Common Pitfalls 3 min read - You might think your sensitive data is secure — but is it really? When navigating the wide array of data security tools available today, you need to be aware of some of the common pitfalls to watch out for so…
June 15, 2015 Cybersecurity Risk: Right Resources, Wrong Place Put Companies Under Threat 2 min read - Seventy-five percent of companies say they aren't mature enough to handle cybersecurity risk. The biggest problem? Poor resource allocation.
Data Protection June 1, 2015 Organizations Ramp Up on NoSQL Databases, but What About Security? 3 min read - Innovative organizations are moving toward NoSQL databases, and security teams must be ready to protect data, ensure compliance and stave off attacks.
May 29, 2015 IRS Data Theft Taxes Patience of 100,000 Users 2 min read - News of an IRS data theft reveals that 100,000 tax returns were stolen using "Get Transcript," prompting $50 million in fraudulent refunds.
Data Protection May 15, 2015 Bridging the Gap Between Your Security Defenses and Critical Data 3 min read - When you're reviewing your current critical data security strategy and thinking of ways to improve, are you asking yourself these five basic questions?
May 14, 2015 VENOM Flaw: The Truth About the Danger to Data Centers and Cloud Customers 2 min read - Researchers recently exposed the VENOM flaw, which could let hackers sabotage virtual machines in cloud computing environments around the world.
Data Protection May 13, 2015 Implement a Proactive Strategy for Data Security 2 min read - Data security and privacy are critical business imperatives in today's data economy. Thus, organizations need to be more proactive in their data security.
May 12, 2015 New Payment Technologies Prompt Data Security Concerns 3 min read - Pressure to migrate to new technologies is creating fresh data security risks for consumers, say stakeholders in the payment systems industry.
Advanced Threats May 8, 2015 Ransomware Triggers Cryptographers’ Call for Action 2 min read - Ransomware is one of the biggest cyberthreats organizations face today. In response, cryptographers are calling for reform to encryption practices.
Data Protection May 7, 2015 Find the Map, Locate the Treasure and Keep the Pirates Away: 10 Data Security and Privacy Best Practices 3 min read - Best practices of the data privacy game include having a treasure map, knowing your allies, defending against pirates and keeping score.