Ensuring the security of personal identifiable information

Posted on Sep 27 2011 by

Everywhere you turn these days there’s word of a new data breach. In the course of our lifetime, our “personal identifying information (PII)” is shared with hundreds of companies, governmental agencies, educational facilities, businesses and health care providers. What can a consumer do to protect their sensitive personal information?

Over-reporting vs. under-reporting data breaches

Posted on Sep 20 2011 by

The onslaught of significant data breaches in the past year has once again spurred legislators to push for national data breach notification legislation.

Counter competitive intelligence: Combating hackers in 7 steps

Posted on Sep 12 2011 by

After an in-depth analysis on how hackers find their targets, security and risk professionals can learn 7 key ways to strengthen their infrastructure and reduce risk profiles.

How hackers find their targets

Posted on Sep 06 2011 by

The rash of large-scale data breaches in the news this year begs many questions, one of which is this: how do hackers select their victims?

Lost memory: How memory sticks can lead to data breaches

Posted on Aug 30 2011 by

A recent survey by the Ponemon Institute uncovered some scary facts about how vulnerable companies are to the threats posed by thumb drives.

Do your passwords pass the hack test?

Posted on Aug 23 2011 by

The steady drumbeat of recent data breaches has called significant attention to the security vulnerabilities of even the world’s biggest corporate brands and defense organizations. These incidents have spotlighted the need for improved breach prevention measures.

The dollars of a data breach

Posted on Aug 16 2011 by

It’s no surprise that data breaches are expensive. The exact cost of these incidents, which have only become more spectacularly headline-grabbing in recent months, is a question that the Ponemon Institute has addressed for the past six years.

Child identity theft: A new frontier for fraudsters

Posted on Aug 09 2011 by

A recent Federal Trade Commission discussion, "Stolen Futures: A Forum on Child Identity Theft,” presented a valuable opportunity to galvanize industry experts and public leaders around this increasing privacy threat.

Security vs. Commerce: Striking a balance

Posted on Aug 02 2011 by

At the recent data security and privacy hearing held by the Senate Commerce, Science and Transportation Committee, there appeared to be widespread agreement that national data breach laws are needed.

As organized crime goes virtual, the law cyber-saddles up

Posted on Jul 26 2011 by

Cyber criminals have been so successful in recent years that they have seemed unstoppable, leaving federal law enforcement struggling with the fast pace of attacks and ever-changing tactics.