data, compliance, audit Box data security, management, organizations, GDPR, Strike Force privacy, vendors, RFPs, cloud, data security DLP Iran DUMPS Conti Hackers Sandbox government HackerOne IBM data security

Survey Says Quantum Computing a Cybersecurity Threat

Now that quantum computers are moving from theory into the realm of experimental, many cybersecurity professionals are starting to appreciate a simple fact: Computers capable of cracking the most sophisticated encryption algorithms ...
Security Boulevard

The Secret Cost of a Frictionless Life

Is making it possible for people to board a plane faster worth compromising their privacy? Maybe. What about brokering their personal data for targeted marketing? Maybe not. All digital initiatives carry a ...
cyberinsurance compliance spending

Take a Fresh Look at Your Annual Security Risk Assessment

The importance of a security risk assessment is clear: It helps healthcare organizations ensure their physical, technical and administrative safeguards are compliant with HIPAA requirements. It also assists in showing areas where ...
Security Boulevard
Anomali

A v-CISO’s Take on the 5 Issues Facing Cybersecurity

A v-CISO is an on-demand consultant with a company’s leadership team with a good vantage point for spotting security issues In just 20 years, we’ve seen the cybersecurity field grow from virtually ...
Security Boulevard
cybersecurity

The Cyber-Risk Paradox: Benefits of New Technologies Bring Hidden Security Risks

When attending cybersecurity conferences, you expect to learn a lot of interesting things surrounding data security, but my experience is that there is always one tidbit, one piece of information, that jumps ...
Security Boulevard
cybersecurity EPA water

Your Employees Pose a Bigger Security Risk Than You Think

Ask a security expert what an organization’s biggest risk or threat is, they answer is almost always “the human factor.” While that could include anybody with access to your network or data, ...
Security Boulevard
computer worm Risk of Using Old Technology

Old Technology: We All Use It, But At What Risk?

How old technology may be introducing security risks to the corporate network We may think of today’s corporate America as a mobile workforce, with everybody conducting business from their phones or tablets ...
Security Boulevard
website Akamai JavaScript

Vulnerable Web Applications Leave All Sectors at Risk

Coming into 2018, security professionals expected to see a continued increase in the use of websites as a means of infecting user workstations, according to a recently released report from Positive Technologies ...
Security Boulevard
data cybersecurity software CISA ransomware cybersecurity protect data c-suite

How CISOs Can Successfully Talk Security to CEOs

It would be funny, if it were not so frustrating, that two individuals so intent on managing risk don’t understand one another. But that is the fundamental problem between business and security ...