Information Security

Information Security news, information, and how-to advice

data search money currency solution uncertainty escape leave

If time is money, what exactly is data?

If you consider how much your data is worth to various parties and in varied contexts, then you’ll be in a better position to understand both its value and the extent to which it needs to be protected.

cool cat with sunglasses independent

3 reasons why security automation is as cool as blockchain

When security teams take advantage of automation, they can rapidly triage alerts, investigate incidents, contain threats, and protect their companies and customers faster than ever before.

email iot internet security

The life and death of a document: where did it really go?

As the Moody Blues would say, what became of that letter you never meant to send?

internet security privacy

What is personally identifiable information (PII)? How to protect it under GDPR

The EU's General Data Protection Regulation requires companies to protect the privacy of their EU customers. That means keeping personally identifiable information (PII) safe. Here's what you need to know.

patching against ransomware

The two most important ways to defend against security threats

Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.

businessman looking through binoculars future vision prediction

The future: it ain’t what it used to be

The problem with the future—as baseball legend Yogi Berra, the founders of the internet and any CISO or CTO can assure you—is that, increasingly, it ain’t what it used to be.

Smart city internet of things with security camera

Identity and the smart city

IAMs next big outing.

bitcoin currency blockchain finance bank binary

6 use cases for blockchain in security

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection.

nup 177120 0001

How the International Olympic Committee can win gold in cybersecurity

While hackers like “Fancy Bears” may continue their mission to create headline-grabbing attacks and disruptive behavior, there are steps every institution across the world and in varying industries can take so they don’t fall victim. ...

man asleep at desk

Becoming vulnerability agnostic

Don't let the constant barrage of vulnerability announcements play with your emotions and drive up your stress levels.

calculator numbers math accounting

Yes, fraud affects your bottom line

It also impacts conversion, customer experience and customer retention.

continuous authentication

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

win compet chess challenge strategy plan

Strategic security

Do you really want to keep solving the same security problems forever?

big data laptop analytics data science

Whose data is it anyway?

Consumer intent matters when deciding whose data belongs to whom.

1a bullet

Mandatory Breach Notification is not a silver bullet

Global experience demonstrates that a Notifiable Data Breach (NDB) regime does little to make organizations act to ensure ongoing information security. And with generous exemptions provided by the Australian NDB rules, data breaches,...

porting converting magic change

Understanding Gartner, and its limitations

Using a Gartner MQ is a great way to get an initial list of some of the products in the particular space. But it is not the definitive list by any stretch of the imagination.

protection privacy security internet network lock

3 ways to make the most of GDPR

EU regulations provide an unprecedented opportunity to elevate cybersecurity as a business enabler.

vulnerable gdpr breach security cyber attack

GDPR keeping you up? There’s another monster hiding under the bed…

There’s another deadline in May that needs to be paid attention to – the NIS Directive.

hipaa compliance 1

Is your cloud service provider ready for HIPAA?

Is your industry’s compliance with the Health Insurance Portability and Accountability Act of 1996 covered in the cloud?

eliminate insider threats 1

7 insider attacks behavior analytics detects

Frequent types of commonly executed insider attacks UEBA detects.

Load More