The OTA "Online Trust Audit and Honor Roll" graded more than 1,000 consumer-facing firms on website security and found that many are simply failing.
When properly aligned with business goals, compliance and security work in concert as part of a holistic, integrated system.
Under a strong data control framework, vendors provide exceptional analytics tools without requiring owners to relinquish total control of the data.
The health care security immune system maps to integrated services and products, addressing specific health care concerns and preventing cyberattacks.
Security researcher Dr. Neal Krawetz reported that the Tor browser discloses details that could enable fraudsters to deduce individual use patterns.
Marketers use email tracking pixels to evaluate their campaigns, but cybercriminals have repurposed the technology to conduct recon on potential victims.
Is digital privacy a right or a privilege? That's the most recent raging debate among consumers, and it could spur a new era of digital misinformation.
With the right QRadar app, security professionals can get a head start on achieving GDPR compliance before the regulation takes effect in May 2018.
The Internet of Things is growing rapidly, and more devices means more opportunities for attackers to expose IoT security gaps.