Equifax says that its digital forensic investigators have found that while its tally of 145.5 million U.S. breach victims hasn't changed, more of them had their email addresses, tax identification numbers and driver's license information exfiltrated.
Orwell got it wrong: People are less likely to surrender their privacy to a totalitarian state than to the lure of sharing holiday snaps, cat videos or the route and time they took for their latest cycling, jogging or kiteboarding outing, as captured by a wearable fitness device.
As threats and attacks become more frequent, the alerts and alarms to be investigated become more unmanageable. Plus, by the time the warnings are checked, the damage may already be done. We need a new paradigm that moves the enterprise from reactive to predictive. Can user behavior analytics and machine learning...
How much does it cost to buy cybercrime-enabling products or services? Just $5 and up, security researchers say. Law enforcement agencies warn that small-time players as well as "serious and organized" crime rings are using cybercrime as a service to make illicit profits.
There are two broad camps of readiness with regard to GDPR. Opportunists are starting from a position of relative advantage. They generally have better information governance processes in place and are more likely to have more mature security capabilities. They seek to leverage these attributes, adopting best data...
In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it.
This whitepaper provides information that:
Equips the business to make more informed decisions...
In an era where users are working simultaneously across mobile,
social and cloud applications and platforms, organizations need
to deploy identity and access management solutions that can scale
and adapt quickly. That's where IDaaS comes in. It simplifies
that onboard experience for the employee and gives...
Why is GDPR so fundamental a change to data processing law? Because new requirements, such as data portability and the right to erasure, will challenge the information governance processes of any organization, however mature. Additionally, joint liability between data controllers and their data processors represents a...
GDPR requires impacted companies to protect personal data of EU residents against data breaches. For security teams this means you must put in place measures that stop personal data from leaking out - without slowing down business processes.
Download this whitepaper and learn how to:
Determine which data is...
Microprocessor makers Intel, ARM and AMD, as well as operating system and software developers and makers of smartphones and other devices, are rushing to prep, test and ship fixes for the serious CPU flaws exploitable via Meltdown and Spectre attacks.
"Replace CPU hardware" might be the only full solution listed by CERT/CC for serious flaws in microprocessors that run millions of PCs, cloud services, servers, smartphones and other devices. Thankfully, many security experts believe patches and workarounds will mostly suffice.
Nissan Canada Finance, which provides financing for Nissan and Infiniti vehicle buyers and leasers, is warning 1.13 million current and former customers that their personal information may have been stolen.
When you launch a VDI or RDSH initiative, you are going to impact the daily lives of people throughout your organization. You can't afford to make mistakes. This reality points to the need to avoid the common pitfalls of VDI and RDSH projects.
Download this whitepaper and learn how to:
Put together the right...
The consumerization of the enterprise represents both a challenge and an opportunity for IT. Implementing a digital workspace solution can help IT harness the rapid changes brought about by consumerization and address the needs of the full range of users and use cases within the business.
Download this whitepaper...
IT's inability to support consumer-like user experience not only hinders productivity, but also presents risk to corporate data as users are likely to seek out alternative solutions or loopholes.
Download this whitepaper and learn how:
"Shadow IT" can be turned into a positive for your organization;