security

News Upcoming Webinars Trade Shows and Events Press Releases Newsletters Blog
data breach concept searching - The Scariest Breach – Your ‘Trusted’ Partners – Part One

The Scariest Breach – Your ‘Trusted’ Partners – Part One

According to Ponemon Institute, 56 percent of organizations have had a breach that was caused by one of their vendors.

Security issues surrounding partners, contractors, suppliers, and third-party stakeholders have been in the news quite frequently. A problem that has typically been overlooked but, hopefully, this increased hullabaloo will cause executives’ eyes to be opened and organizational plans made, to address the who, what, and where of corporate information that may be compromised or exposed, either intentionally or unintentionally. Another to-do item to add to your security plan. You do have one, don’t you?…

Read More
GDPR

WDYT? Is the Digital Strip Search Going Too Far?

In New Zealand there is a zest for security. In the past, customs required travelers to provide any electronic devices for search purposes. What they neglected to incorporate into the law was that travelers were required to provide a password, digital fingerprint, or personal identification number (PIN).…

Read More
GDPR - Data Breaches

Prison for Execs for Data Breaches – Gotta Love It!

I love this bill. According to an article in Security Week, Democrat Senator Ron Wyden released a draft bill named the Consumer Data Protection Act of 2018. It aims to give consumers control over their data, including how it’s sold or shared, and gives the US Federal Trade Commission (FTC) the power to issue fines and other penalties.…

Read More
Auto Classification

Facebook Victims of Breach – It’s Only 30 Million not 50 Million

Do you ever get tired of Facebook always being in the press for what is essentially poor security? If you ask me, what’s the difference between 30 million users and 50 million users?…

Read More
Security - Concept Searching

Does Anybody Care What Time It Is? Threat Latency

I sometimes wonder if we have become inured to security breaches, they are becoming so commonplace. For large corporations, the millions spent on remediation appears to be only a drop in the bucket, and we have all seen that some of their ‘ethics’ are, at times, questionable.…

Read More
Solving Data Breach Problems

Insider Versus Outsider – Where Is the Real Threat? How One Company Solved its Data Breach Problem

Human activity can be risky. IT administrators may get bogged down with trivial items, become complacent, and adopt an ‘if it isn’t broke, don’t fix it’ attitude.…

Read More
Data Breaches and Classification Solution - Concept Searching

Here We Go Again – Whistleblower or Cybercriminal?

Just the other day, Tesla got hacked by one of its now ex-employees, who did quite a bit of damage – stealing gigabytes of data and regularly, supposedly, exporting data and selling it to third parties.…

Read More
Discovery, Risk, Insight

Let’s Just Not Tell Anyone Billions of User Records Were Hacked

Poor Yahoo, now Altaba. It was recently fined a whopping $35 million dollars by the Securities and Exchange Commission (SEC), for sitting on its massive data breach for two years. In case you don’t recall the details, dastardly Russian cyberhackers managed to obtain the entire Yahoo database, which contained billions of usernames, email addresses, phone numbers, birthdates, passwords, and security questions.…

Read More
General Data Protection Regulation (GDPR)

GDPR – Lion or Lamb?

As some of us remember, when the century changed, many thought the world would come to a standstill in transitioning from 1999 to 2000. It didn’t. In fact, things went pretty smoothly.…

Read More
GDPR Compliance

GDPR Compliance? What Are 92 Percent of You Waiting For?

The General Data Protection Regulation (GDPR) has finally made some organizations sit up and take notice. Obviously, not enough though. According to PwC, 92 percent of US-based companies consider GDPR compliance a top data protection priority, yet only 6 percent are compliance ready.…

Read More
Next Page »