CISO August 24, 2016 Get the Security Budget You Need and Spend It Wisely 4 min read - Many CISOs find it challenging to convince their boards of directors to increase their security budget to mitigate the cost of a potential data breach.
Cloud Security August 18, 2016 Can Cloud Security Decrease Breach Containment Costs? 3 min read - Are cloud security tools worth the investment? It depends the type of tools, how they're configured and how they're implemented.
Data Protection August 16, 2016 As India Gears Up for Cybersecurity Challenges, Threats Are Multiplying 3 min read - India has launched a series of initiatives aimed at overcoming cybersecurity challenges, decreasing costs and battling modern threats.
X-Force August 4, 2016 The True Cost of Cybercrime in Brazil 4 min read - As the spotlight turns to Rio, cybercrime in Brazil continues to rise. In fact, the average cost of a data breach increased significantly in 2016.
Intelligence & Analytics August 1, 2016 Managed SIEM: The Digital Detective Helping to Fight Cybercrime 3 min read - As the cyberthreat landscape continues to evolve, many companies are turning to managed SIEM systems to analyze and respond to potential security threats.
Data Protection July 26, 2016 The Cost of a Data Breach in India: What You Need to Know 2 min read - Indian companies should implement data security strategies such as encryption and threat sharing to reduce the impact and cost of a data breach.
July 18, 2016 Cyberattacks From Outside the Perimeter Are Costly, Ponemon Institute Finds 2 min read - A new Ponemon study found that external cyberattacks are costly, yet security professionals don't have the perimeter tools needed to prevent them.
June 30, 2016 Latest Ponemon Study Reveals More Enterprises Embracing an Encryption Strategy 2 min read - A recent survey from the Ponemon Institute detailed how organizations across industries are embracing an encryption strategy to protect critical data.
Data Protection June 20, 2016 Have a Cost Conversation With Your C-Suite 2 min read - The Ponemon Cost of Data Breach report helps you have a fact-based cost conversation about security with your C-suite or board.
Data Protection June 15, 2016 Uncovering Risk From SAP HANA Vulnerabilities Can Be Simple and Easy 2 min read - Vulnerabilities in a SAP HANA system can result in major consequences for users, but identifying and remediating these issues can be easy.