Best Practices for ID Theft Services and Programs

Posted on May 18 2016 by

While there are some critics of identity theft protection and credit monitoring services, consumers need a tool to fight against identity theft and fraud in today’s data breach climate. As a result of this demand, there has recently been a flurry of new services to the market.


Experian Acquires CSID

Posted on May 11 2016 by

I am pleased to share the news on this blog that Experian has signed a definitive agreement to acquire CSIdentity Corporation (CSID), a leading provider of consumer identity management and fraud detection services.


Video: IAPP Panel on Employee Security Threats

Posted on May 05 2016 by

Did you miss Experian’s panel at the recent IAPP event in April? A red-hot topic in many industries, employees negligence is the primary cause of a majority of breaches. How can companies address this liability?


Facing Greater Risks, Small Businesses Still Lag in Adopting Cyber Insurance

Posted on Apr 19 2016 by

What difference does $4.40 make? It can’t buy you much on its own, but it can make a world of difference when you’re handling the aftermath of a data breach or other cyberattack.


How Can You Reduce Data Breach Costs?

Posted on Apr 05 2016 by

Bad news and good news emerged from the Ponemon Institute’s 2015 Cost of a Data Breach study, released in May: breach costs continue to rise, but security measures such as creating a data breach response team can significantly curb the costs of a data breach.


Video: 2016 Predictions – Mauricio Paez

Posted on Mar 31 2016 by

Mauricio Paez, a partner with the international law firm Jones Day, recently joined me to share predictions about eight emerging and evolving trends in global cyberwarfare. Watch to learn his insights.


Video: 2016 Predictions – Jon-Michael Brook

Posted on Mar 30 2016 by

With 2016 an election year that's already seen some evidence of campaign breaches, how much more will we see the frequency and intensity potential increase before the polls close? Jon-Michael Brooke of Guide Holdings LLC joins me for a preview of the most significant potentials for the campaign whose data is snatched.


Video: 2016 Predictions – Lynn Sessions

Posted on Mar 24 2016 by

How do healthcare breaches continue to differ in their response to discovery and notification? Lynn Sessions of BakerHostetler shares how an increase in true security violations by external forces has triggered an increase in notifications on a serious scale in the healthcare space.


Why Are Employees the Weakest Link in Breach Prevention? Hear Answers at IAPP Global Privacy Summit

Posted on Mar 22 2016 by

Employees are a company’s biggest asset, but when it comes to cyber security, they are often the weakest link. Unfortunately, a large number of security incidents are caused by employee negligence or the compromise of their computers or phones, leaving even companies with strong technical security programs at risk.


Video: 2016 Predictions – Bill Hardin

Posted on Mar 18 2016 by

With the first quarter of 2016 wrapping up, it’s a good time to take a look at the cyber security trends that emerged at the end of 2015 and the beginning of 2016. What are the cyber risks companies will need to be most vigilant against for the rest of the year?