Latest Post

Loading...
Stealing data through doppelganger domains...

A new form of data hacking has been exposed by two researchers who found ways to easily penetrate Fortune 500 companies through mistyped email...

Read More Stealing data through doppelganger domains
Cyberdefense without coffee breaks...

Strong cyberdefense means strong planning to mitigate the risks of a breach and strong support to help your organization fight against hackers. The solution, experts say, is to shift from the goal of perfect security to active...

Read More Cyberdefense without coffee breaks
Cyber crime gets costlier...

The Ponemon Institute’s recently released “Second Annual Cost of Cyber Crime Study” confirms that data breaches have become a more frequent and damaging hazard of busin...

Read More Cyber crime gets costlier
Ensuring the security of personal identifiable informa...

Everywhere you turn these days there’s word of a new data breach. In the course of our lifetime, our “personal identifying information (PII)” is shared with hundreds of companies, governmental agencies, educational facilities, businesses and health care providers. What can a consumer do to protect their sensitive personal infor......

Read More Ensuring the security of personal identifiable information
Over-reporting vs. under-reporting data breaches...

The onslaught of significant data breaches in the past year has once again spurred legislators to push for national data breach notification legislation....

Read More Over-reporting vs. under-reporting data breaches
Counter competitive intelligence: Combating hackers in...

After an in-depth analysis on how hackers find their targets, security and risk professionals can learn 7 key ways to strengthen their infrastructure and reduce risk...

Read More Counter competitive intelligence: Combating hackers in 7 steps
How hackers find their targets...

The rash of large-scale data breaches in the news this year begs many questions, one of which is this: how do hackers select their victims?...

Read More How hackers find their targets
Lost memory: How memory sticks can lead to data breach...

A recent survey by the Ponemon Institute uncovered some scary facts about how vulnerable companies are to the threats posed by thumb...

Read More Lost memory: How memory sticks can lead to data breaches
Do your passwords pass the hack test?...

The steady drumbeat of recent data breaches has called significant attention to the security vulnerabilities of even the world’s biggest corporate brands and defense organizations. These incidents have spotlighted the need for improved breach prevention m...

Read More Do your passwords pass the hack test?
The Dollars of a Data Breach...

It’s no surprise that data breaches are expensive. The exact cost of these incidents, which have only become more spectacularly headline-grabbing in recent months, is a question that the Ponemon Institute has addressed for the past six years....

Read More The Dollars of a Data Breach
Child identity theft: A new frontier for fraudsters...

A recent Federal Trade Commission discussion, "Stolen Futures: A Forum on Child Identity Theft,” presented a valuable opportunity to galvanize industry experts and public leaders around this increasing privacy t...

Read More Child identity theft: A new frontier for fraudsters
Security vs. Commerce: Striking a balance...

At the recent data security and privacy hearing held by the Senate Commerce, Science and Transportation Committee, there appeared to be widespread agreement that national data breach laws are...

Read More Security vs. Commerce: Striking a balance