Time matters when it comes to breach containment. One of the ways to improve your reaction time in the critical 24 hours after a data breach is through cybersecurity drills.
The creation and ultimate effectiveness of the Privacy Shield is a critical element to the future of commercial relationships between the United States and EU.
Nearly all business cloud applications lack enterprise-grade security and compliance features. This new report analyzed over 108 million documents and 15,000 cloud apps, providing insights into cloud application use.
The vast majority of hospitals and of other healthcare providers say that security is a key business priority. However, healthcare breach numbers are climbing and the costs associated with these breaches are also trending up.
While big breaches grab all the headlines, smaller breaches can cause just as much trouble for those affected.
According to the latest research from Gartner, worldwide spending on information security products and services will likely reach $81.6 billion in 2016.
These two new HIPAA settlements are meant to send a strong message about enforcement and accountability. The result for one of those cases was a record-setting settlement of $5.55 million.
What happens when IT purchases are made with the explicit permission of IT but without specific oversight? With proper planning and guidelines, decentralized IT does not need to lead to true Shadow IT.