Blog Posts Tagged with "data breach"
2019 Predictions: What Will Be This Year’s Big Trends in Tech?
January 16, 2019 Added by:Matt Johnson
What will 2019 bring, and how can businesses prepare themselves for the technological developments to come over the next twelve months?
Comments (0)
Cyber Security Lessons from Abroad – Australia’s Essential Eight
November 28, 2018 Added by:Kevin Alexandra
Whitelisting applications and restricting administrative privileges play important roles in helping organisations identify vulnerable assets and set appropriate defences for their networks and applications.
Comments (0)
6 Ways to Use CloudTrail to Improve AWS Security
October 02, 2018 Added by:Sanjay Kalra
Managing security in Amazon Web Services (AWS) is not a set-it-and-forget-it type of proposition.
Comments (0)
Variations in State Data Breach Disclosure Laws Complicate Compliance
September 26, 2018 Added by:John Moran
New data breach notification laws are good news for consumers, better news for attorneys, but not very good news for businesses already struggling to stay on top of a constantly evolving regulatory landscape.
Comments (0)
Under Expanding Cyber Siege, CISOs Admit Clear Visibility on Attacks Is a Challenge
September 12, 2018 Added by:Liviu Arsene
Increasingly, CISOs recognize that visibility must be relevant if they want to efficiently contain breaches and not waste precious time on a witch-hunt.
Comments (0)
Criminal Cyberattacks Are Up. Can Automated Security Help Bring Them Down?
July 26, 2018 Added by:James Lee
Companies that still rely on manual processes – security tools that require frequent tuning or manual CVE patching, for example – fare worse if they are breached.
Comments (0)
Every Business Can Have Visibility into Advanced and Sophisticated Attacks
June 18, 2018 Added by:Liviu Arsene
Building a strong security ecosystem is about having both the shield and the sword working together to increase the overall security posture of the organization.
Comments (0)
Cloud Security Alert – Log Files Are Not the Answer
April 18, 2018 Added by:Lora O'Haver
Once production applications and workloads have been moved to the cloud, re-evaluating the company’s security posture and adjusting the processes used to secure data and applications from cyberattacks are critical next steps.
Comments (0)
Centering Your Security Strategy on Leadership, Resilience and Fundamentals
March 16, 2018 Added by:Steve Durbin
Companies that prioritize well-equipped security programs and widespread security awareness are more prepared to grow, innovate and compete.
Comments (0)
Increasing Board Accountability and Expertise Is Critical to Security and Risk Management
March 09, 2018 Added by:Greg Reber
The Board of Directors (BoD) is ultimately responsible for the future of their company. Shareholders expect that the companies they have invested in will follow through on specific, well-informed plans to mitigate risk in every form.
Comments (0)
The IT Security Lessons from 2017
December 22, 2017 Added by:Avishai Wool
A look at the IT security lessons that can be learned from 2017
Comments (0)
Putting Off Plans to Strengthen Data Security? It Could Cost You Your Job
December 11, 2017 Added by:Tim Critchley
A cybersecurity incident can adversely affect individuals within an organization, costing an employee their job, career and possibly their future.
Comments (0)
Follow the Money — Stemming Hacker Habits
June 30, 2017 Added by:Steve McGregory
Cybercriminals aren’t stopping anytime soon. Ensure you have a finger on the pulse of your network or be ready to become another notch on a hacker’s belt.
Comments (0)
Why Is Digital Property Monitored Less than Physical Property?
March 09, 2017 Added by:Ajit Singh
If we were to place as much emphasis on monitoring events that take place on our IT systems as we do monitoring spending habits and shoplifting, many of the data breaches we hear about today could be largely mitigated.
Comments (0)
The Third Party Threat
February 16, 2017 Added by:Michael Patterson
A data compromise is inevitable for companies wherever it might emanate from. Therefore an organizations’ ability to respond to an incident is key.
Comments (0)
2017 Cybersecurity Trends Already in Action
February 08, 2017 Added by:Nathan Burke
With each passing year, it seems that newly-uncovered hacks and the number of users impacted grow larger and larger. One big prediction for 2017 that we haven’t seen come true yet is that we'll have a new major breach.
Comments (0)
- Trump Administration Starts the Ball Rolling with the National Cyber Strategy
- A Call to Structure
- What CEOs Need to Know About the Future of Cybersecurity
- Who’s Responsible for Your Cyber-Security?
- CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
- Mozilla Concerned of Facebook’s Lack of Transparency
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Magento Patches Command Execution, Local File Read Flaws
- The Biggest Security Hurdles in Your Business, and How to Overcome Them
- Four Technologies that will Increase Cybersecurity Risk in 2019