Fail-safe measures such as encryption can help organizations minimize cloud and third-party risks in the virtually inevitable event of a data breach.
A recent survey by cloud security firm RedLock attributed the rise in cloud data leaks to inadequate policies, lack of compliance and other poor practices.
Security leaders in the health care, financial services, and energy and utilities sectors must pay special attention to industry-specific security risks.
To prepare for the upcoming "Star Trek: Discovery" series, here are eight cybersecurity lessons companies can learn from the science fiction franchise.
Organizations must pay closer attention to cloud security risks, such as third-party access and human error, that are hiding in plain sight.
To protect students, parents and teachers from data theft, academic institutions must adopt comprehensive strategies to mitigate command injection attacks.
Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program
Security professionals need a layered, end-to-end life cycle approach to managing the security risks associated with enterprise cloud computing.
Today's students must grapple with security and privacy issues, such as identity theft and financial fraud, that could affect them well past graduation.
A third-party contractor inadvertently exposed Verizon customer data, including names, phone numbers and PINs belonging to 14 million subscribers.
Zombie cloud data — information that lingers in the cloud even after a user supposedly deletes it — can open organizations to data theft and noncompliance.