Is Your Data Breach Response Plan Effective?

Is Your Data Breach Response Plan Effective?

We’ve posted many times about the importance of having a data breach response plan in place. Indeed, the FTC just released its own guidance on data breach response. A new study, however, demonstrates that “having a response plan is simply not the same as being prepared,” particularly if […]

The Impact of Corporate Data Loss from Mobile Devices

The Impact of Corporate Data Loss from Mobile Devices

Companies are haemorrhaging data from the endpoint, and there is no single, clear cause behind this steady flow. According to a new survey by NetEnrich, Corporate IT Hounded by Mobile Security Concerns, 42% of IT pros said their organizations suffered key corporate data loss from a mobile device.

Yahoo Breach Underscores Need for Automated Security Tools

Yahoo Breach Underscores Need for Automated Security Tools

The recent data breach disclosed by Yahoo is set to be a game changing event. Already, the breach has had immediate repercussions both for Yahoo, potentially putting its Verizon acquisition at risk, and for other organizations.

Governments Around the World Hit Hard by Breaches

Governments Around the World Hit Hard by Breaches

We’ve explored how data breaches are skyrocketing at government agencies in the US at the federal, state and local levels. This same trend is mirrored by governments the world over.

Preparing for the Australian Data Breach Notification Bill

Preparing for the Australian Data Breach Notification Bill

Cybercrime in Australia has led to increasing pressure on the Australian federal government to pass mandatory data breach notification legislation.

Public Sector Data Breaches Skyrocket Globally in 2016

Public Sector Data Breaches Skyrocket Globally in 2016

The latest IBM X-Force Threat Intelligence research recently revealed a global spike in government data breaches.

The Importance of Cybersecurity Drills

The Importance of Cybersecurity Drills

Time matters when it comes to breach containment. One of the ways to improve your reaction time in the critical 24 hours after a data breach is through cybersecurity drills.

Balance Prevention with Response in Your Security Spending

Balance Prevention with Response in Your Security Spending

According to the latest research from Gartner, worldwide spending on information security products and services will likely reach $81.6 billion in 2016.