How to Create a Data Security and Control Framework

How to Create a Data Security and Control Framework

Data is the lifeblood of today’s digital businesses. Protecting corporate data from theft, misuse, and abuse is the top responsibility of every Security and Risk (S&R) leader, notes Forrester’s Data Security and Privacy report.

Are Organizations Overconfident About Cloud Security?

Are Organizations Overconfident About Cloud Security?

Given the ever-increasing number of data breaches, organizations have been struggling to regain control over data security. Some do this by shifting their corporate data from data centres to the public cloud.

Preparing for the Australian Data Breach Notification Bill

Preparing for the Australian Data Breach Notification Bill

Cybercrime in Australia has led to increasing pressure on the Australian federal government to pass mandatory data breach notification legislation.

The Importance of Cybersecurity Drills

The Importance of Cybersecurity Drills

Time matters when it comes to breach containment. One of the ways to improve your reaction time in the critical 24 hours after a data breach is through cybersecurity drills.

The EU-US Privacy Shield’s Growing Pains

The EU-US Privacy Shield’s Growing Pains

The creation and ultimate effectiveness of the Privacy Shield is a critical element to the future of commercial relationships between the United States and EU.

Business Cloud Apps Not as Secure as Enterprises Believe

Business Cloud Apps Not as Secure as Enterprises Believe

Nearly all business cloud applications lack enterprise-grade security and compliance features. This new report analyzed over 108 million documents and 15,000 cloud apps, providing insights into cloud application use.

How to Close the Gaps In Your Security Strategy

How to Close the Gaps In Your Security Strategy

For years, organizations have been secured like fortresses, building walls around networks, applications, storage containers, and devices. But those walls crumble the moment they’re needed.

Technology Investment: Who Makes the Decisions in Your Company?

Technology Investment: Who Makes the Decisions in Your Company?

What happens when IT purchases are made with the explicit permission of IT but without specific oversight? With proper planning and guidelines, decentralized IT does not need to lead to true Shadow IT.