How citizen ownership of data impacts business going forward

How citizen ownership of data impacts business going forward

Is California's Consumer Privacy Act of 2018 (CCPA) poised to become the new standard in the United States?

How GDPR impacts US cybersecurity policy

How GDPR impacts US cybersecurity policy

With the GDPR in full effect, expect to start seeing an impact in the US sooner vs. later. All it will take is the next major data breach for the American public to start demanding ownership of their personal data.

Cybersecurity outlook: data protection takes center stage

Cybersecurity outlook: data protection takes center stage

From an ever-increasing uptick in data breaches to the rise of Cybercrime-as-a-Service, data protection will continue to be top of mind for CIOs and their teams through 2018 and beyond.

Why enhanced authentication methods should play a bigger role in your security plan

Why enhanced authentication methods should play a bigger role in your security plan

As a further consequence of data breaches, the loss of employee data loss doesn’t just impact the employee; it can also cause measurable harm to the employer. Learn how impactful such a breach could be for your company and how to...

How managers can best communicate the importance of cybersecurity to employees

How managers can best communicate the importance of cybersecurity to employees

We must challenge ourselves to think differently about how and what we’re communicating if we want to be successful in making security a priority for our employees.

How to ensure that giving notice doesn’t mean losing data

How to ensure that giving notice doesn’t mean losing data

The employee exit process often devolves into a fire-drill for IT teams. Having a documented process and a strong relationship with HR can help your team go from reactive to proactive.

Ransomware prevention is insider threat mitigation

Ransomware prevention is insider threat mitigation

Addressing the insider threat to help deter exposure to ransomware.

Protecting intellectual property against cyberattack

Protecting intellectual property against cyberattack

The news is full of data breaches that hold hostage or expose customer information. But attacks targeting intellectual property (IP) can do great damage as well. What do we know about the characteristics of IP attacks, and how can IP...

2018 Crowd Research Partners 'Insider Threat Report': hopes and fears revealed

2018 Crowd Research Partners 'Insider Threat Report': hopes and fears revealed

An overwhelming number of organizations feel vulnerable to insider attacks – but you might be surprised at the top three risk factors enabling this vulnerability.

How employee monitoring can help solve England's productivity problem

How employee monitoring can help solve England's productivity problem

Can the data you get from employee monitoring software help drive productivity – and other financial – benefits?

Government entities remain vulnerable to insider threats

Government entities remain vulnerable to insider threats

Recommendations on how the U.S. Postal Service and other government entities can improve cyber security.

How to calculate your return on security investments

How to calculate your return on security investments

While there certainly are ways to detail the ROI of security, there's still a lot of miscalculation that happens when it comes to the true cost of a security incident.

Cost of insider threats vs. investment in proactive education and technology

Cost of insider threats vs. investment in proactive education and technology

When it comes to security, education- or technology-based solutions can potentially save organizations a significant amount of money.

Top Blog Posts