
Lack of confidence in data security can cost you more than you think
The majority of companies don’t understand the value of their data, because they aren’t taking the necessary steps to study the information they are gathering from customers.

GDPR: Where we were…and where we’re going
It’s clear that conventional methods to data security aren’t working anymore, so it’s time to step away from breach prevention and focus on a “secure breach” approach.

Let’s get serious about security: 2.6 billion records stolen or compromised in 2017
Gemalto’s 2017 Breach Level Index found 2.6 billion records were compromised in 2017, as well a number of new data breach tactics. Breached or exposed data is not only a headache for security teams. It also impacts brand reputation,...

Understanding the challenges of cloud security
Stay grounded as cloud security becomes more complicated.

Data breaches are taking a toll on customer loyalty
Concern about data breaches among consumers is high.

IoT security concerns are rising
Until consumers and businesses increase their knowledge of how to protect themselves and adopt industry standard approaches, IoT will continue to be a treasure trove of opportunity for hackers.
More data records were lost or stolen in the first half of 2017 than all of 2016
918 data breaches led to 1.9 billion data records being compromised worldwide in the first half of 2017.

Protecting data: when confidence is overconfidence
According to the recently released annual Data Security Confidence Index (DSCI), many businesses today are guilty of feeling overconfident about keeping hackers at bay, while at the same time failing to keep data safe.

How ransomware is creating a data backup explosion
As ransomware becomes more common, everyone will need to better understand the different types, how they work, and what their broader effects will be on the IT and IT security industries.

The merging of enterprise and consumer identities means it’s time for a universal identity
The different ways enterprise and consumer identities are becoming even more similar and what we as a security community should do about that.

Educating the public about security – are we doing it all wrong?
If consumers don’t truly understand the measures that businesses are putting in place to protect their data, they won’t be aware of how secure their data is. There are five key steps that any business must undertake when protecting...
Data breaches: It’s still personal
Data breaches for the first half of 2016 shifted from stolen credit card data and financial information to the theft of something more personal—identities.

Hacking for the greater good
Ethical hackers are the new white knights, looked upon as strengthening our collective security and making the cyber landscape safe for all.

2017 breach predictions: The big one is inevitable
In 2017, we’ll see more intricate, complex and undetected data integrity attacks and for two main reasons: financial gain and/or political manipulation.

Securing the breach trumps breach prevention
Data breaches are not going away. By implementing a three-step approach, organizations can effectively prepare for a data breach.
Data breaches: This time it's more personal
Data breaches have shifted from stolen credit card data and financial information to the theft of something much more intimate—identities.

IT security’s reality distortion field
IT security has a reality distortion field when it comes to perimeter security. IT needs to create a 'Secure Breach' environment to safeguard data.