This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
More than fifty percent of survey respondents struggle to align security initiatives to business goals and 44 percent aren't clear on what the business goals are, says a Thycotic Cyber Security Team's Guide to Success report.
For a long time, it may have seemed like consumers virtually had no power, and that businesses could do anything they want with individuals’ private information with nearly no repercussions – but that time is rapidly expiring. With increased state regulations, it is clear that businesses must step up their security game by pseudonymizing their data, rendering the data unidentifiable, so when that data travels across state lines and organizational boundaries, the data is still protected, as well as the business and its reputation.
Today, the average American leaves the house with a smartphone that has more computing power than the systems that landed humans on the moon. The Internet of Things (IoT) enables refrigerators to tell you that you’re running out of milk and cars to provide assisted driving. The reality is that the knowledge economy is in full swing, and the modern world’s relationship with technology has advanced to a state where nearly all aspects of our daily lives are touched by the internet.
The New Jersey Office of Homeland Security and Preparedness (NJOHSP) and the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) are promoting cybersecurity best practices throughout October alongside a coalition of private businesses, nonprofit organizations, government agencies and academic institutions.
Eighty-six percent of respondents in a survey are confident or very confident they have no gaps in their security controls deployed across devices, applications, people and data, in a Forrester Consulting Study.
Facebook has suspended "tens of thousands" of apps connected to the platform after they were suspected of collecting large amounts of data, according to a news report.
PT Lion Mentari Airlines, Indonesia’s biggest private carrier, is investigating a data breach that led to private information of passengers on its Malaysian and Thai units being leaked online, according to many news reports.
New York Attorney General Letitia James announced a lawsuit against Dunkin’ Brands, Inc. — franchisor of Dunkin’ Donuts — for failing to protect thousands of customers targeted in a series of cyberattacks.