Phishing attacks take up close to five hours of employees' time per year and cost large organizations $3.7 million on average, according to new research.
In planning for and responding to a data breach, IT experts should work with business continuity teams as part of a cohesive incident response plan.
The "2015 Cost of Data Breach Study: Global Analysis" showed that the financial and operational consequences of a data breach are quite significant.
IBM and the Ponemon Institute have released the "2015 Cost of Data Breach Study: Global Analysis," examining all aspects of organizational data breaches.
Pressure to migrate to new technologies is creating fresh data security risks for consumers, say stakeholders in the payment systems industry.
While users have improved when it comes to detecting possible threats on their computers, they may be less wary when it comes to their mobile devices.
A threat intelligence report prepared for the U.K. government suggests IT professionals need better information to protect against cybercriminals.
Dating Apps and Corporate Directories: Dr. Sleuthe Eistheimer’s New Social Security Productivity Powered by Grumpy Cat
Data security for apps is vital, but are other lines of business missing opportunities for efficiency from the wealth of insightful apps held by employees?
Security professionals waste time and money choosing which security alerts to investigate. Automation is a great way to track and analyze threats.
According to an IBM-sponsored Ponemon Institute study on mobile security, apps are being created quickly to meet user demand but are not always secure.