For years, organizations have been secured like fortresses, building walls around networks, applications, storage containers, and devices. But those walls crumble the moment they’re needed.
What happens when IT purchases are made with the explicit permission of IT but without specific oversight? With proper planning and guidelines, decentralized IT does not need to lead to true Shadow IT.
According to a new study by Nasdaq, 40% of respondents do not feel responsible for the repercussions of a cyberattack.
There is a huge disconnect between corporate confidence in security preparedness and the number of actual security incidents that occur each year.
The average cost of a data breach continues to rise, up to $4 million per incident, over 2015 figures of $3.79 million. Since 2013, there has been a 29% increase in the average cost of data breaches.
This survey revealed that in-house counsel have a skewed view of their organization’s security preparedness, an overconfidence that can lead to dangerous complacency.
MySpace, Tumblr and LinkedIn are all currently grabbing headlines for data breaches that happened years ago and have only now come to light.
A new study from Ponemon asks individuals at organizations that currently have data protection and privacy training programs to weigh in on the question of the Insider Threat.