A Security Checklist for Financial Services Organizations

|
In the eyes of the cyberattacker, just about anything and everything out there is a target. But whether for the theft of personal and confidential information (such as passwords and PIN numbers) or having enough data about somebody to launch a covert identity theft attack down the road, their ultimate ... Read More

Prosegur Reaches Agreement To Acquire Majority Stake in Cipher

|
Cipher is a leading cybersecurity company with main operations in the United States, Brazil and United Kingdom. The combination of Prosegur, a global benchmark in the private security sector, and Cipher, represents a step forward in the implementation of advanced integrated security solutions. Prosegur consolidates its cybersecurity business with a ... Read More

How to Enable a Culture of DevOps in Security

|
DevOps as a whole is a state of mind for organizations. It helps them to deliver applications and services by espousing a culture and best-practice methodology that drive product development and service provision ... Read More

Use these Critical Security Controls for a Better Security Posture

|
As we near the end of 2018, technology professionals and businesses alike are looking back on the last 12 months and evaluating highs and lows. For businesses, this can be an essential step when it comes to evaluating the current state of security processes and protocol within the organization. The ... Read More

The Key Components to an Information Security Policy

|
Information Security Policy (ISP) is a set of rules enacted by an organization to ensure that all users or networks of the IT structure within the organization’s domain abide by the prescriptions regarding the security of data stored digitally within the boundaries the organization stretches its authority ... Read More

Consider These Factors When Calculating the Cost of a Data Breach

|
Data breaches are one of the most common types of security incidents. It is quite possible, although it may be hard to prove, that every company around the globe was at some point a victim of information leakage ... Read More

Ways to Reduce the Exorbitant Costs of a Data Breach

|
Reducing the cost of data breaches is a vital consideration for any good security strategy. In fact, when a breach occurs, many factors can influence its cost, either increasing or decreasing the final amount. Some of those aspects are external to the company, such as laws and regulations, and must ... Read More

Ten Ways Your Healthcare Org May Be Violating HIPAA

|
HIPAA legislation was established by the US Federal Government in 1996. These are rules and standards designed to protect the security and privacy of patient health information. It has implemented national requirements for organizations and individuals designed to enforce certain technical, physical and administrative safeguards to maintain the integrity, availability, ... Read More

The Pros and Cons to Outsourcing Incident Response

|
Companies usually outsource tasks if they are more cost effective and can produce consistent results. Outsourcing incident response functions ensures a company will get consistent, reliable results if an incident occurs. Many cybersecurity jobs go unfilled, because the pool of qualified applicants is currently smaller than the amount of jobs ... Read More

Stretching Your Security Budget Dollars

|
An excessive security budget isn’t the only way to build strong security ... Read More