The "2015 Cost of Data Breach Study: Global Analysis" showed that the financial and operational consequences of a data breach are quite significant.
IBM and the Ponemon Institute have released the "2015 Cost of Data Breach Study: Global Analysis," examining all aspects of organizational data breaches.
Pressure to migrate to new technologies is creating fresh data security risks for consumers, say stakeholders in the payment systems industry.
While users have improved when it comes to detecting possible threats on their computers, they may be less wary when it comes to their mobile devices.
A threat intelligence report prepared for the U.K. government suggests IT professionals need better information to protect against cybercriminals.
Dating Apps and Corporate Directories: Dr. Sleuthe Eistheimer’s New Social Security Productivity Powered by Grumpy Cat
Data security for apps is vital, but are other lines of business missing opportunities for efficiency from the wealth of insightful apps held by employees?
Security professionals waste time and money choosing which security alerts to investigate. Automation is a great way to track and analyze threats.
According to an IBM-sponsored Ponemon Institute study on mobile security, apps are being created quickly to meet user demand but are not always secure.
SSH keys are valuable to cybercriminals because stolen credentials can be used to access critical servers. Here are some facts regarding the issue.
IT organizations are wasting valuable time and money hunting down false positives while advanced persistent threats evade preventive controls.