How to Close the Gaps In Your Security Strategy

How to Close the Gaps In Your Security Strategy

For years, organizations have been secured like fortresses, building walls around networks, applications, storage containers, and devices. But those walls crumble the moment they’re needed.

Technology Investment: Who Makes the Decisions in Your Company?

Technology Investment: Who Makes the Decisions in Your Company?

What happens when IT purchases are made with the explicit permission of IT but without specific oversight? With proper planning and guidelines, decentralized IT does not need to lead to true Shadow IT.

Every Employee is Accountable for Data Security

Every Employee is Accountable for Data Security

According to a new study by Nasdaq, 40% of respondents do not feel responsible for the repercussions of a cyberattack.

Don’t Let the Media Influence Your Data Security Planning

Don’t Let the Media Influence Your Data Security Planning

There is a huge disconnect between corporate confidence in security preparedness and the number of actual security incidents that occur each year.

Data Breach Costs Rise to $4 Million Per Incident

Data Breach Costs Rise to $4 Million Per Incident

The average cost of a data breach continues to rise, up to $4 million per incident, over 2015 figures of $3.79 million. Since 2013, there has been a 29% increase in the average cost of data breaches.

In-House Counsel Overconfident About Data Security

In-House Counsel Overconfident About Data Security

This survey revealed that in-house counsel have a skewed view of their organization’s security preparedness, an overconfidence that can lead to dangerous complacency.

Why You Should Be Concerned About Every Data Breach

Why You Should Be Concerned About Every Data Breach

MySpace, Tumblr and LinkedIn are all currently grabbing headlines for data breaches that happened years ago and have only now come to light.

Companies Weigh In On The Insider Threat

Companies Weigh In On The Insider Threat

A new study from Ponemon asks individuals at organizations that currently have data protection and privacy training programs to weigh in on the question of the Insider Threat.