Data Protection March 18, 2015 In Data Security, What’s Your Security Nirvana? 2 min read - Approaching enterprise data security by identifying business drivers can help organizations reach their security nirvana and keep secure from threats.
March 17, 2015 US Senate Intelligence Committee Secretly Approves Cybersecurity Information Sharing Act 2 min read - The U.S. Senate Intelligence Committee recently approved the Cybersecurity Information Sharing Act, which would encourage businesses to share information.
March 13, 2015 Security Breach at Point of Sale Vendor NEXTEP Highlights Third-Party Security Risks 3 min read - Point of sale vendor NEXTEP recently experienced a payment card data breach, highlighting the risks companies face when partnering with third parties.
March 12, 2015 Lesson Learned? Data Breach at University of Chicago Exposes Student Records 2 min read - Student records and faculty information were exposed as part of a data breach against the University of Chicago. It is unclear who is responsible.
March 10, 2015 Study: Banking ID Theft Losses Decline Despite New Data Breaches 2 min read - According to a recent study, even though banking ID theft is on the rise, the number of banking customers victimized and the total cost are down.
Mainframe March 9, 2015 The Absence of Evidence Is Not the Evidence of Absence 3 min read - Large corporations tend to have a lack of data or evidence. By completing their data set, they can gain insight into their systems and protect themselves.
Data Protection March 6, 2015 Big Data Requires Big Protection 3 min read - Big data management presents complex challenges, and enterprises need real-time monitoring and alerting to track what is happening and what may happen.
March 5, 2015 Publicly Stored Security Key May Have Enabled Uber Data Breach 2 min read - A recent data breach at Uber may have been enabled by a security key stored on a public GitHub page, according to a lawsuit filed by Uber.
Data Protection March 4, 2015 Data Security: How Vulnerable Is Your Critical Data? 2 min read - Data security today requires a holistic approach that caters to customer concerns and leverages cloud, mobile, social and big data with confidence.
Intelligence & Analytics March 3, 2015 Cyber Forensics: From Dark Arts to Common Practice 2 min read - Organizations' security teams can use cyber forensics to better respond to increasingly sophisticated and advanced security threats.