Social Security numbers act as unique identifiers and, if compromised by fraudsters, can put individuals' personal data at risk.
Given the sensitivity of data and the rising volume of cyberattacks across the globe, government agencies have deep concerns about cloud security.
The majority of Microsoft SharePoint users are calling for better controls and safeguards for sensitive data, according to a recent study.
What does it really take to have a successful identity and access governance program to centralize and govern your identity management?
Carelessness with data handling creates many unnecessary risks. Here are some examples of this neglect and what you can do about it.
Ex-employees aren't always cut off from corporate networks. How do companies ensure sensitive data is protected when users leave the fold?
Data security and privacy are critical business imperatives in today's data economy. Thus, organizations need to be more proactive in their data security.
According to a recent study, cyber security threats have become the number-one concern of corporate boards because of their possible scale and cost.
We exist in a constantly changing threat environment. As the threats evolve, the security solutions, best practices, industry standards and regulatory compliance must also evolve to keep up with the threat landscape. For many organizations, this...
Trusteer has recently observed a new Citadel malware variant that targets the Payza online payment platform, which is popular in developing countries.