The first step in creating a complete data security plan is to know what types of data the company collects, where it is stored, and with whom and how it is shared. Next, the business should determine the potential risks to that data and whether the information resides in electronic or physical form (or both).
Pamela Perini, certified PSP and president of Pamela Perini Consulting, talks to Security about her journey through security and the process of risk assessment. She also touches on the importance of certification in the security industry and factors to consider when designing a security program.
What should security leaders focus on as they look to 2022? Organizational resilience, reputational risk and cybersecurity all will play major roles in enterprise security.
Check out five tips on how to execute a successful ransomware tabletop exercise, including how to identify key participants and ensure representatives from core business and operations teams are involved.
If hackers can learn the ins and outs of your network, shouldn’t you beat them to the punch by obtaining deeper visibility and holistic mapping of your network infrastructure and attached applications, services, and devices?
Compromised passwords led to many data breaches in 2021, a record-breaking year for cyber vulnerabilities. Dashlane compiled the sixth annual "Worst Password Offenders" list, which highlights high-profile cyber incidents.
Security professionals can use these four strategies to better protect themselves against third-party risk, which can lead to cyberattacks and data breaches.
A study from AdvisorSmith ranked sectors by their cost of cyber insurance. Organizations in the financial industry reported the highest cyber insurance expenses.