Lack of confidence in data security can cost you more than you think

Lack of confidence in data security can cost you more than you think

The majority of companies don’t understand the value of their data, because they aren’t taking the necessary steps to study the information they are gathering from customers.

GDPR: Where we were…and where we’re going

GDPR: Where we were…and where we’re going

It’s clear that conventional methods to data security aren’t working anymore, so it’s time to step away from breach prevention and focus on a “secure breach” approach.

Let’s get serious about security: 2.6 billion records stolen or compromised in 2017

Let’s get serious about security: 2.6 billion records stolen or compromised in 2017

Gemalto’s 2017 Breach Level Index found 2.6 billion records were compromised in 2017, as well a number of new data breach tactics. Breached or exposed data is not only a headache for security teams. It also impacts brand reputation,...

Understanding the challenges of cloud security

Understanding the challenges of cloud security

Stay grounded as cloud security becomes more complicated.

Data breaches are taking a toll on customer loyalty

Data breaches are taking a toll on customer loyalty

Concern about data breaches among consumers is high.

IoT security concerns are rising

IoT security concerns are rising

Until consumers and businesses increase their knowledge of how to protect themselves and adopt industry standard approaches, IoT will continue to be a treasure trove of opportunity for hackers.

More data records were lost or stolen in the first half of 2017 than all of 2016

918 data breaches led to 1.9 billion data records being compromised worldwide in the first half of 2017.

Protecting data: when confidence is overconfidence

Protecting data: when confidence is overconfidence

According to the recently released annual Data Security Confidence Index (DSCI), many businesses today are guilty of feeling overconfident about keeping hackers at bay, while at the same time failing to keep data safe.

How ransomware is creating a data backup explosion

How ransomware is creating a data backup explosion

As ransomware becomes more common, everyone will need to better understand the different types, how they work, and what their broader effects will be on the IT and IT security industries.

The merging of enterprise and consumer identities means it’s time for a universal identity

The merging of enterprise and consumer identities means it’s time for a universal identity

The different ways enterprise and consumer identities are becoming even more similar and what we as a security community should do about that.

Educating the public about security – are we doing it all wrong?

Educating the public about security – are we doing it all wrong?

If consumers don’t truly understand the measures that businesses are putting in place to protect their data, they won’t be aware of how secure their data is. There are five key steps that any business must undertake when protecting...

Data breaches: It’s still personal

Data breaches: It’s still personal

Data breaches for the first half of 2016 shifted from stolen credit card data and financial information to the theft of something more personal—identities.

Hacking for the greater good

Hacking for the greater good

Ethical hackers are the new white knights, looked upon as strengthening our collective security and making the cyber landscape safe for all.

2017 breach predictions: The big one is inevitable

2017 breach predictions: The big one is inevitable

In 2017, we’ll see more intricate, complex and undetected data integrity attacks and for two main reasons: financial gain and/or political manipulation.

Securing the breach trumps breach prevention

Securing the breach trumps breach prevention

Data breaches are not going away. By implementing a three-step approach, organizations can effectively prepare for a data breach.

Data breaches: This time it's more personal

Data breaches have shifted from stolen credit card data and financial information to the theft of something much more intimate—identities.

IT security’s reality distortion field

IT security’s reality distortion field

IT security has a reality distortion field when it comes to perimeter security. IT needs to create a 'Secure Breach' environment to safeguard data.

Top Blog Posts