Everything Must Go: Effective Data Removal When a Business Closes

Ineffective data removal from corporate desktop computers, laptops, external drives, servers and other IT equipment containing highly sensitive data can pose a serious security risk down the road.  In March, Toys ‘R’ Us broke the hearts of millions when the company announced the closing of all its 735 U.S. stores. When a business decides to..
Read more

How to Stop Cryptomining and Cryptojacking Attacks

Cryptomining and cryptojacking attacks are on the rise In the last six months, we’ve seen an escalation in malicious cryptomining and cryptojacking activities. Tesla AWS S3 was hacked to run cryptomining malware. The U.S. Courts official website, UK’s National Health Service (NHS) and Information Commissioner’s Office, and the Australian state governments for Victoria and Queensland..
Read more

Will Data Regulation Help Stop Data Breaches?

With the recent headline-making breaches such as Lord & Taylor and Panera, U.S. consumer sentiment is quickly shifting.  Accordingly to a recent study from the American Institute of CPAs (AICPA), 81 percent of consumers are actively worried about how well businesses will protect their personal information and taking actions to safeguard their data. We are..
Read more

When Your Greatest Cybersecurity Doubters Are in the C-Suite

A recent global survey by Microsoft and Marsh found that enterprise leaders rank cybersecurity a top-five concern, yet only 1 in 5 are highly confident their company can manage and respond to a cyber-event. CISOs, let’s consider that for a moment: You’re a valued member of the C-suite, with visibility and reporting to the board..
Read more

10 Best Practices for Data Security in a GDPR World

Rapid technology advances have brought new challenges for the protection of personal data, so every organization needs a comprehensive approach to privacy management. They must also document how they collect, process and store personal data. But too many companies still fall down on the security fundamentals, and new regulations such as the General Data Protection Regulation (GDPR), Payment Card Industry (PCI) Data Security Standard, Health Insurance..
Read more

Low-Priority Threats: The Achilles Heel of Security Teams

No company has ever been breached as a result of a high-severity alert. There may be a few exceptions, but high-severity alerts are not generally what’s keeping security teams up at night. Organizations are well-prepared to diffuse a threat once it’s identified and deemed a priority. Breaches overwhelmingly occur when threats are misrepresented, misprioritized or..
Read more

Real-Time Analytics for PCI Compliance

When the PCI Security Standards Council bans SSL/early TLS in June 2018, you’ll need real-time network analytics to maintain compliance. Here’s why. On June 30, any business that handles credit card data will be required by the Payment Card Information (PCI) Security Standards Council to eliminate the weak cryptographic protocols SSL and early TLS from..
Read more

GDPR Countdown Checklist: 3 Strategic To-Do’s for Cybersecurity Teams

Over the past two years, many IT security teams began working closely with their business unit colleagues on implementing new security solutions, or upgrading existing ones, to help ready their enterprises for complying with the EU’s General Data Protection Regulation (GDPR). As the May 25 enforcement deadline nears, organizations are finalizing their compliance strategies to..
Read more

Identifying False Positives to Improve Email Security

In March 2016, the email security of former White House Chief of Staff John Podesta was breached. A spear-phishing email warning Podesta to change his Google password was caught and placed in his spam folder but mistaken by a staff member as legitimate. The email was opened and the password entered by the staffer, after..
Read more
Page 1 of 512345