The second rule of data breaches should be (the first being don’t have one) to stop doing harm. On this account, Experian failed considerably.
All about Virtualization and Cloud Security | Recent Articles:
We can’t always make it to the conference, and when we do we can’t always get to see every talk we’d like to see. That’s one of the reasons why I like to shop around YouTube from time to time and look for talks I wish I’d seen in person.
An analysis of healthcare data breaches for the first half of the year shows that the healthcare industry is on the path to suffer more one data breach a day this year.
One doesn’t have to look far to see software is vulnerable, and who better to discuss the perceived state of software security than developers. With that in mind, Netsparker recently conducted a survey that looked at the views of developers on eactly this subject.
A bill introduced earlier this week in the United States Senate aims to bolster the security of Internet-connected devices by using the vast-purchasing power of the United States Government to enforce a baseline security standard.
A cybersecurity breach scandal involving the Swedish Transport Authority, Transportstyrelsen, erupted late last week and throughout the weekend according to numerous news reports.
When it comes to attaining readiness for General Data Protection Regulation (GDPR) the clock is ticking. The GDPR is a set of regulatory mandates (Regulation (EU) 2016/679) that seek to shore up and streamline data protections for citizens within the European Union, including providing residents control over data about them and limiting exports of such data outside the union.
Many organizations believe that turning to cloud can help them better secure their environments, and many also contend that DevOps practices help them to better build secure software. While that is certainly debatable, a new survey of 929 IT professionals found that the majority believe that the best benefits come from combining DevOps and cloud.
A substantial ransomware attack rocked many organizations throughout Europe and the United States this week. Here are seven of the best Tweets Tweeted about GoldenEye / PetrWrap
In our previous post we talked about the importance of the role of the CISO when it comes to helping organizations to maintain solid security programs and maintain alignment between what an enterprise decides its security posture should be and the personnel, technical, and process controls that need to be in place to enforce that policy.
Let’s face it, being a CISO can be one of the most thankless jobs in the c-Suite. I’m sure there are many security professionals who will say it is in fact the most thankless job in the c-suite.