Latest Post

Loading...
Ensuring the security of personal identifiable informa...

Everywhere you turn these days there’s word of a new data breach. In the course of our lifetime, our “personal identifying information (PII)” is shared with hundreds of companies, governmental agencies, educational facilities, businesses and health care providers. What can a consumer do to protect their sensitive personal infor......

Read More Ensuring the security of personal identifiable information
Over-reporting vs. under-reporting data breaches...

The onslaught of significant data breaches in the past year has once again spurred legislators to push for national data breach notification legislation....

Read More Over-reporting vs. under-reporting data breaches
Counter competitive intelligence: Combating hackers in...

After an in-depth analysis on how hackers find their targets, security and risk professionals can learn 7 key ways to strengthen their infrastructure and reduce risk...

Read More Counter competitive intelligence: Combating hackers in 7 steps
How hackers find their targets...

The rash of large-scale data breaches in the news this year begs many questions, one of which is this: how do hackers select their victims?...

Read More How hackers find their targets
Lost memory: How memory sticks can lead to data breach...

A recent survey by the Ponemon Institute uncovered some scary facts about how vulnerable companies are to the threats posed by thumb...

Read More Lost memory: How memory sticks can lead to data breaches
Do your passwords pass the hack test?...

The steady drumbeat of recent data breaches has called significant attention to the security vulnerabilities of even the world’s biggest corporate brands and defense organizations. These incidents have spotlighted the need for improved breach prevention m...

Read More Do your passwords pass the hack test?
The Dollars of a Data Breach...

It’s no surprise that data breaches are expensive. The exact cost of these incidents, which have only become more spectacularly headline-grabbing in recent months, is a question that the Ponemon Institute has addressed for the past six years....

Read More The Dollars of a Data Breach
Child identity theft: A new frontier for fraudsters...

A recent Federal Trade Commission discussion, "Stolen Futures: A Forum on Child Identity Theft,” presented a valuable opportunity to galvanize industry experts and public leaders around this increasing privacy t...

Read More Child identity theft: A new frontier for fraudsters
Security vs. Commerce: Striking a balance...

At the recent data security and privacy hearing held by the Senate Commerce, Science and Transportation Committee, there appeared to be widespread agreement that national data breach laws are...

Read More Security vs. Commerce: Striking a balance
As organized crime goes virtual, the law cyber-saddles...

Cyber criminals have been so successful in recent years that they have seemed unstoppable, leaving federal law enforcement struggling with the fast pace of attacks and ever-changing...

Read More As organized crime goes virtual, the law cyber-saddles up
Trouble in the clouds: Data breaches threaten cloud co...

Cloud services that handle enormous amount of data amongst consumers and corporate clients are a big target of...

Read More Trouble in the clouds: Data breaches threaten cloud computing
Encryption: Data’s best friend...

When considering your company’s full breach prevention strategy, consider encryption a strong bodyguard that can play a big role in protecting data while also shielding your company from embarrassing and costly b...

Read More Encryption: Data’s best friend