A Security Checklist for Financial Services Organizations
In the eyes of the cyberattacker, just about anything and everything out there is a target. But whether for the theft of personal and confidential information (such as passwords and PIN numbers) or having enough data about somebody to launch a covert identity theft attack down the road, their ultimate ... Read More
Prosegur Reaches Agreement To Acquire Majority Stake in Cipher
Cipher is a leading cybersecurity company with main operations in the United States, Brazil and United Kingdom. The combination of Prosegur, a global benchmark in the private security sector, and Cipher, represents a step forward in the implementation of advanced integrated security solutions. Prosegur consolidates its cybersecurity business with a ... Read More
How to Enable a Culture of DevOps in Security
DevOps as a whole is a state of mind for organizations. It helps them to deliver applications and services by espousing a culture and best-practice methodology that drive product development and service provision ... Read More
Use these Critical Security Controls for a Better Security Posture
As we near the end of 2018, technology professionals and businesses alike are looking back on the last 12 months and evaluating highs and lows. For businesses, this can be an essential step when it comes to evaluating the current state of security processes and protocol within the organization. The ... Read More
The Key Components to an Information Security Policy
Information Security Policy (ISP) is a set of rules enacted by an organization to ensure that all users or networks of the IT structure within the organization’s domain abide by the prescriptions regarding the security of data stored digitally within the boundaries the organization stretches its authority ... Read More
Consider These Factors When Calculating the Cost of a Data Breach
Data breaches are one of the most common types of security incidents. It is quite possible, although it may be hard to prove, that every company around the globe was at some point a victim of information leakage ... Read More
Ways to Reduce the Exorbitant Costs of a Data Breach
Reducing the cost of data breaches is a vital consideration for any good security strategy. In fact, when a breach occurs, many factors can influence its cost, either increasing or decreasing the final amount. Some of those aspects are external to the company, such as laws and regulations, and must ... Read More
Ten Ways Your Healthcare Org May Be Violating HIPAA
HIPAA legislation was established by the US Federal Government in 1996. These are rules and standards designed to protect the security and privacy of patient health information. It has implemented national requirements for organizations and individuals designed to enforce certain technical, physical and administrative safeguards to maintain the integrity, availability, ... Read More
The Pros and Cons to Outsourcing Incident Response
Companies usually outsource tasks if they are more cost effective and can produce consistent results. Outsourcing incident response functions ensures a company will get consistent, reliable results if an incident occurs. Many cybersecurity jobs go unfilled, because the pool of qualified applicants is currently smaller than the amount of jobs ... Read More
Stretching Your Security Budget Dollars
An excessive security budget isn’t the only way to build strong security ... Read More