Driven by the EU's General Data Protection Regulation and other regulations, as well as the move to the cloud, more organizations are turning to data classification to help them silo and protect their most sensitive information, says Tony Pepper, CEO of Egress.
Michael Jones of Domain Tools says that studying domain ownership information gives organizations "contextual data around domains that may be attacking them," thus allowing them to better block attacks, avoid malicious sites and combat phishing campaigns.
Electric car manufacturer Tesla has sued a former employee for sabotage, alleging that he "unlawfully hacked the company's confidential and trade secret information" and gave it to third parties while leaving a trail designed to implicate other employees. The ex-employee, however, claims he's a whistleblower.
Cybersecurity insurers, faced with growing demand, are looking for new ways to better measure their risks, says Aleksandr Yampolskiy, CEO of SecurityScorecard. So some are moving toward more carefully scrutinizing the cybersecurity postures of their potential clients.
Look at information security through the lens of business risk, and you'll begin to make decisions about security in light of their impact on the business. With security threats emerging faster than ever, what if your most important information is not protected? What strategic business advantage do you gain if it is...
Although all the major credit card brands have dropped the requirement for obtaining signatures to verify point-of-sale transactions made with EMV payment cards, they're not pushing strongly for using PINs instead, leaving that authentication decision to card issuers, says Linda Kirkpatrick of Mastercard.
Have you heard the statistics supporting the fact that every enterprise - from airlines and appliance manufacturers to banks and hospitals - needs to make a digital transformation? By 2020, 72% of the world's employees will be mobile workers, more than 20B devices will be connected to the internet of things and we'll...
Recent apparent hack attacks against Canadian banks, the sentencing of a Canadian for helping enable the Yahoo breach, and the Equifax breach's impact in Canada all point to the need to be more aggressive in ramping up cybersecurity efforts in light of emerging threats.
Protecting data has become more challenging as...
A mental healthcare practice's decision to pay a ransom to have sensitive patient data unlocked illustrates the difficult choices that organizations can face when attempting to recover from a ransomware attack.
Organizations that use unpatched software face a race against the clock, with attackers regularly beginning to hammer new
vulnerabilities just hours after new fixes or security alerts get released to the public.
Download this whitepaper to learn more about:
Why patch management isn't a problem that can be...
There is a lot to say about the disorganized way most cyber incident claims are currently handled. Instead, adopting a project management approach will make better use of resources and lead to several benefits.
To this point, many incidents have traditionally been handled with a "lawyer-heavy" approach, but the...
The Department of Homeland Security has yet again issued a warning about cybersecurity vulnerabilities in medical devices. These warnings have come after independent researchers, or the companies themselves, have reported the problems.
A former CIA software engineer who is facing child pornography charges is a possible suspect in the largest-ever leak of classified information from the spy agency. While Joshua A. Schulte has not been charged with the leak, prosecutors have indicated they will soon indict him.
Since mobile banking usage is set to grow exponentially, banks must overcome structural challenges and
reconcile consumers' appetite for ease of use with the desire for greater security.
There are a growing number of fintech startups that have been able to overstep the legacy cost structures