Your biggest data breach risk may be on your payroll

Posted on Oct 25 2011 by

Data breaches may conjure images of malicious hackers and global cyber gangs, but often the worst breaches come at the hands of a company’s own employees.


Stealing data through doppelganger domains

Posted on Oct 18 2011 by

A new form of data hacking has been exposed by two researchers who found ways to easily penetrate Fortune 500 companies through mistyped email addresses.


Cyberdefense without coffee breaks

Posted on Oct 11 2011 by

Strong cyberdefense means strong planning to mitigate the risks of a breach and strong support to help your organization fight against hackers. The solution, experts say, is to shift from the goal of perfect security to active monitoring.


Cyber crime gets costlier

Posted on Oct 04 2011 by

The Ponemon Institute’s recently released “Second Annual Cost of Cyber Crime Study” confirms that data breaches have become a more frequent and damaging hazard of business.


Ensuring the security of personal identifiable information

Posted on Sep 27 2011 by

Everywhere you turn these days there’s word of a new data breach. In the course of our lifetime, our “personal identifying information (PII)” is shared with hundreds of companies, governmental agencies, educational facilities, businesses and health care providers. What can a consumer do to protect their sensitive personal information?


Over-reporting vs. under-reporting data breaches

Posted on Sep 20 2011 by

The onslaught of significant data breaches in the past year has once again spurred legislators to push for national data breach notification legislation.


Counter competitive intelligence: Combating hackers in 7 steps

Posted on Sep 12 2011 by

After an in-depth analysis on how hackers find their targets, security and risk professionals can learn 7 key ways to strengthen their infrastructure and reduce risk profiles.


How hackers find their targets

Posted on Sep 06 2011 by

The rash of large-scale data breaches in the news this year begs many questions, one of which is this: how do hackers select their victims?


Lost memory: How memory sticks can lead to data breaches

Posted on Aug 30 2011 by

A recent survey by the Ponemon Institute uncovered some scary facts about how vulnerable companies are to the threats posed by thumb drives.


Do your passwords pass the hack test?

Posted on Aug 23 2011 by

The steady drumbeat of recent data breaches has called significant attention to the security vulnerabilities of even the world’s biggest corporate brands and defense organizations. These incidents have spotlighted the need for improved breach prevention measures.