Lastminute.com is a worldwide travel company that helps customers in 40 countries search and book travel related products and services. The company operates a portfolio of well-known brands, each with a consumer website in multiple languages and its own security and performance needs. Their total combined traffic...
The 2019 Insider Data Breach survey gathered responses from 252 U.S. and 253 U.K.-based IT leaders (CIOs, CTOs, CISOs and IT Directors) and 2004 U.S. and 2003 U.K.-based employees to assess the root causes of these employee-driven data breaches, as well as the frequency and impact of such instances.
Download the...
Office 365 provides a solid foundation to which many organizations should add third-party solutions in order to provide higher levels of security, content management, encryption and other capabilities.
Download this Osterman Research report and learn about Office 365's:
Limitations in data loss prevention...
Making data security as people-centric as possible by applying strong risk-based controls is the only way organizations can best secure data while also enabling employees to do their jobs, says Tony Pepper of Egress Software Technologies.
A recent report from Osterman Research has shown that while Office 365 has many benefits, its broad, one-size-fits-all approach means not all information security scenarios and use cases are addressed. As a result, organizations are spending 37% of the average Office 365 deployment budget on complementary third-party...
A former U.S. Air Force counterintelligence agent was indicted for disclosing classified information and helping Iran compromise the computers of other U.S. intelligence agents. The case marks another damaging leak for the American government.
What if organizations' information security practices have gotten so good that they're finally repelling cybercriminals and nation-state attackers alike? Unfortunately, the five biggest corporate breaches of the past five years - including Yahoo, Marriott and Equifax - suggest otherwise.
Proposed rules released this week by the Department of Health and Human Services aim to define and discourage inappropriate blocking of the secure sharing of health information, Elise Sweeney Anthony of the Office of the National Coordinator for Health IT explains in an interview at the HIMSS19 conference.
The Future Is Here; Go With It
Industry analysts see a major shift to software-defined storage (SDS), with SDS overtaking conventional storage by 2020. Container-based or container-native storage (CNS) is a big part of that move. Government agencies and organizations are better off accepting and adopting the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.