Latest Post

Loading...
Best Practices for ID Theft Services and Programs...

While there are some critics of identity theft protection and credit monitoring services, consumers need a tool to fight against identity theft and fraud in today’s data breach climate. As a result of this demand, there has recently been a flurry of new services to the market....

Read More Best Practices for ID Theft Services and Programs
Experian Acquires CSID...

I am pleased to share the news on this blog that Experian has signed a definitive agreement to acquire CSIdentity Corporation (CSID), a leading provider of consumer identity management and fraud detection...

Read More Experian Acquires CSID
Video: IAPP Panel on Employee Security Threats...

Did you miss Experian’s panel at the recent IAPP event in April? A red-hot topic in many industries, employees negligence is the primary cause of a majority of breaches. How can companies address this l...

Read More Video: IAPP Panel on Employee Security Threats
Facing Greater Risks, Small Businesses Still Lag in Ad...

What difference does $4.40 make? It can’t buy you much on its own, but it can make a world of difference when you’re handling the aftermath of a data breach or other cyb...

Read More Facing Greater Risks, Small Businesses Still Lag in Adopting Cyber Insurance
How Can You Reduce Data Breach Costs?...

Bad news and good news emerged from the Ponemon Institute’s 2015 Cost of a Data Breach study, released in May: breach costs continue to rise, but security measures such as creating a data breach response team can significantly curb the costs of a data b...

Read More How Can You Reduce Data Breach Costs?
Video: 2016 Predictions – Mauricio Paez...

Mauricio Paez, a partner with the international law firm Jones Day, recently joined me to share predictions about eight emerging and evolving trends in global cyberwarfare. Watch to learn his...

Read More Video: 2016 Predictions – Mauricio Paez
Video: 2016 Predictions – Jon-Michael Brook...

With 2016 an election year that's already seen some evidence of campaign breaches, how much more will we see the frequency and intensity potential increase before the polls close? Jon-Michael Brooke of Guide Holdings LLC joins me for a preview of the most significant potentials for the campaign whose...

Read More Video: 2016 Predictions – Jon-Michael Brook
Video: 2016 Predictions – Lynn Sessions...

How do healthcare breaches continue to differ in their response to discovery and notification? Lynn Sessions of BakerHostetler shares how an increase in true security violations by external forces has triggered an increase in notifications on a serious scale in the healthcare...

Read More Video: 2016 Predictions – Lynn Sessions
Why Are Employees the Weakest Link in Breach Preventio...

Employees are a company’s biggest asset, but when it comes to cyber security, they are often the weakest link. Unfortunately, a large number of security incidents are caused by employee negligence or the compromise of their computers or phones, leaving even companies with strong technical security programs at risk.......

Read More Why Are Employees the Weakest Link in Breach Prevention? Hear Answers at IAPP Global Privacy Summit
Video: 2016 Predictions – Bill Hardin...

With the first quarter of 2016 wrapping up, it’s a good time to take a look at the cyber security trends that emerged at the end of 2015 and the beginning of 2016. What are the cyber risks companies will need to be most vigilant against for the rest...

Read More Video: 2016 Predictions – Bill Hardin
What the EMV Liability Shift Means for Your Business...

As of last October, the EMV liability shift is a point of reality for consumers and businesses alike. Now, if your business is not yet chip-ready and card fraud occurs in a point-of-sale transaction in which a consumer uses a chip-enabled card, you — not the card-holder or issuer...

Read More What the EMV Liability Shift Means for Your Business
Infographic: Timeline of a Data Breach Response...

Preparing a breach response plan is sometimes a painful topic, planning the response that should happen after your business becomes the unfortunate victim of a cyber attack. How exactly should things work? Explore the timing of the planning and execution of a response – before and after the breach...

Read More Infographic: Timeline of a Data Breach Response