The Target retail POS breach is the most talked-about incident in recent memory - and it was entirely preventable with available security solutions, says Adam Tegg CEO of Wontok Solutions.
The regulatory environment means that monitoring what information leaves your organization is as vital as protecting it from external attacks. Email is one of the most likely routes by which data may leak, maliciously or more often accidentally. A successful Data Leak Prevention system will address the issue of email...
Data loss prevention is more important now than ever before. Targeted attacks increased by 42 percent in 2012, with an average of 8,350 identities lost per breach. Watch this 5-minute video from Symantec to understand how a DLP solution may impact your organization.
Organizations can measurably reduce their risk of data loss by understanding where their data is going, how it's being used, and how to prevent its loss or theft. This allows you to take action on the biggest vulnerabilities and secure their most valuable information. Symantec Data Loss Prevention (DLP) lets you...
The financial services industry will make wider use of data analytics next year as the value of leveraging big data to help prevent or detect fraud becomes more clear, experts predict.
Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences and how IT pros are responding. Among the results: the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations - such as deploying a...
An employee of the New York state agency that investigates Medicaid fraud is being investigated after the individual allegedly sent 17,743 records to the worker's personal e-mail account.
Losses linked to retail breaches have fueled class action lawsuits on behalf of consumers. But Javelin's Al Pascual says banks are soon likely to take legal action, too, in breach cases that expose cards and lead to fraud.
The consumerization of IT and the popularity of BYOD are jeopardizing the security and integrity of enterprise data. Seeking an easy way to share files across smart phones, tablets, and desktops, employees are using free public cloud file sharing services that lack rigorous security and audit controls. These services...
The cost of a data breach or privacy violation goes far beyond compromised records to include hard-dollar expenditures for breach notification, credit monitoring, regulatory fines and legal fees. Not to mention the immeasurable cost of reputation loss.
To avoid these losses, security leaders are increasingly...
Data security used to be about building firewalls and protections around the data. Now it's about securing the data itself. That's why data is the new perimeter, says Charlie Pulfer of Titus.
A new study says, on average, it takes 87 days to first recognize that insider fraud has occurred. Why the delay? Researcher Larry Ponemon and Christine Meyers of Attachmate Luminet discuss the findings.
The big, external breaches get the headlines, but the insider crimes are doing significant financial damage, says Tim Ryan of Kroll Advisory Solutions. How can organizations address the insider threat?
RSA Conference 2013 opens Feb. 25 in San Francisco, and for the fourth straight year Information Security Media Group will be a Platinum Media Sponsor. What's on the agenda of this world-class security event?
Organizations typically secure data where it resides and is transmitted. Data-centric security strategies focus on securing the data itself. Mark Bower of Voltage Security explains.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.