Preparedness, planning, and strategies for execution
The Ponemon Institute’s recently released “Second Annual Cost of Cyber Crime Study” confirms that data breaches have become a more frequent and damaging hazard...
Everywhere you turn these days there’s word of a new data breach. In the course of our lifetime, our “personal identifying information (PII)” is...
After an in-depth analysis on how hackers find their targets, security and risk professionals can learn 7 key ways to strengthen their infrastructure and...
The rash of large-scale data breaches in the news this year begs many questions, one of which is this: how do hackers select their...
A recent survey by the Ponemon Institute uncovered some scary facts about how vulnerable companies are to the threats posed by thumb...
The steady drumbeat of recent data breaches has called significant attention to the security vulnerabilities of even the world’s biggest corporate brands and defense...
A recent Federal Trade Commission discussion, "Stolen Futures: A Forum on Child Identity Theft,” presented a valuable opportunity to galvanize industry experts and public...
At the recent data security and privacy hearing held by the Senate Commerce, Science and Transportation Committee, there appeared to be widespread agreement that...
Cyber criminals have been so successful in recent years that they have seemed unstoppable, leaving federal law enforcement struggling with the fast pace of...
When considering your company’s full breach prevention strategy, consider encryption a strong bodyguard that can play a big role in protecting data while also...
A well-crafted social media policy with clear guidelines addressing these and other risks can substantially reduce the number of data breach incidents related to...
According to a Report to the Nations on Occupational Fraud and Abuse, in 2009, the average company lost nearly 5% of its revenue to...