This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security leaders must possess the skills to advocate for security in the boardroom. How can cyber professionals best present data-centric security to their organizations?
A breach of the GoDaddy Managed WordPress hosting environment exposed information from up to 1.2 million users, including email addresses, login information and more.
When it comes to insider threats and document protection, security leaders can take a few practical steps to mitigating both intentional and unintentional breaches.
By performing a risk assessment, mitigating potential threats and working with managed service providers, healthcare organizations can better protect themselves from cyberattacks.
Sixth annual corporate preparedness study also reveals that businesses lack confidence in preventing an attack.
March 4, 2019
Are companies ready for today's sophisticated cybercriminals and impact of data breaches? Experian's new study says that progress has been made, but companies need to do better.
Fifty-six percent of organizations experienced a data breach involving more than 1,000 records over the past two years, and of those, 37 percent occurred two to three times and 39 percent were global in scope, according to Experian.
Eighty-four percent of CISOs in North America believe cybersecurity breaches are inevitable, and a lack of influence in the boardroom is making it difficult to justify the necessary cybersecurity budgets.
A company is never able to predict when or by what means it may be targeted in a cyberattack, but it can prepare a robust response plan in the event of a breach. That response – contingent on the team, corporate processes and the technology that supports them – will ultimately determine whether a company ends up on the front page of The New York Times next to Equifax with its clients’ information on the Dark Web.
ON DEMAND: Security’s digital transformation is now entering stage 5. Complex security technologies are connected to HR systems, global security operations centers, and other building technologies in a world where employees now work in two places: home and the corporate office.