Latest Post

Loading...

The average value of a lost laptop is $49,246, a number based on several factors: replacement cost, detection, forensics, data breach, lost intellectual property...

December 13, 2011 by bkrenek

With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape. Hidden behind the online mistletoe,...

December 6, 2011 by ofonseca

According to a new report by British insurance firm Willis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with the...

November 16, 2011 by bkrenek

It is a cruel irony that service members who defend our country by fighting abroad are often most at risk from the threat of...

November 10, 2011 by ofonseca

It can be unnerving to be told that your information has been compromised in a data breach. The uncertainty of not knowing all the...

November 2, 2011 by kbarney

Data breaches may conjure images of malicious hackers and global cyber gangs, but often the worst breaches come at the hands of a company’s...

October 25, 2011 by bkrenek

A new form of data hacking has been exposed by two researchers who found ways to easily penetrate Fortune 500 companies through mistyped email......

October 18, 2011 by ofonseca

Strong cyberdefense means strong planning to mitigate the risks of a breach and strong support to help your organization fight against hackers. The solution,...

October 11, 2011 by bkrenek

The Ponemon Institute’s recently released “Second Annual Cost of Cyber Crime Study” confirms that data breaches have become a more frequent and damaging hazard...

October 4, 2011 by ofonseca

Everywhere you turn these days there’s word of a new data breach. In the course of our lifetime, our “personal identifying information (PII)” is...

September 27, 2011 by kbarney

The onslaught of significant data breaches in the past year has once again spurred legislators to push for national data breach notification legislation.... September 20, 2011 by bkrenek

After an in-depth analysis on how hackers find their targets, security and risk professionals can learn 7 key ways to strengthen their infrastructure and...

September 12, 2011 by tbowers