data security

Consumers believe privacy is not possible, leading to a change in online behavior
82% of online users in the US and 75% in the UK are choosing to change the way they behave online, according to a new consumer survey by FigLeaf. For these respondents, 74% …

Anatomy of a ransomware attack: How attackers gain access to unstructured data
Ransomware isn’t a new phenomenon, but it’s effects are starting to be felt more widely, and more deeply than ever before. Behemoths like Sony, Nissan, FedEx, Kraft Foods and …

Significant trends are beginning to develop in the Government ID market
The worldwide installed base of both smart and legacy credentials will grow from 9.8 billion in 2018 to 11.5 billion in 2023, according to ABI Research. With increased rates …

Personal security and national security concerns are back on the rise
More than one in five (22%) Americans say they have cancelled plans or considered cancelling plans to attend large-scale public events due to concerns about physical attacks …

Analytics and automation solutions to help contact center IT staff ensure compliance
91% of of contact center IT staff believe increasing contact center compliance software investment should be considered a priority in the next year. 83% of contact center …

Unclassified data creates security blind spots for most companies
Global businesses continue to house ‘dark data’ within their organizations, creating a honeypot for cybercriminals, finds research from Veritas Technologies. The …

Structural integrity: Quantifying risk with security measurement
In my previous post, we set up the foundation for a risk quantification program. Many organizations have begun this part of their security strategy and are learning how to …

High-risk behaviors expose most travelers to cyber risks
The travel industry and its customers are increasingly the targets of cyberattacks as criminals seek to monetize highly valuable travel data, according to the new IBM Security …

Data privacy: A hot-button issue for Americans one year after GDPR
The General Data Protection Regulation (GDPR) went into effect in the European Union a year ago this month. GDPR, which gives EU citizens more control over their personal data …

Companies increasingly investing in container adoption, security remains an issue
87 percent of IT professionals are now running container technologies, with 90 percent of those running in production and 7 in 10 running at least 40 percent of their …

Organizations face operational deficiencies as they deal with hybrid IT complexities
While enterprises are taking advantage of cloud computing, all enterprises have on-going data center dependencies, a Pulse Secure report reveals. One fifth of respondents …

Core Elastic Stack security features now available to all users
Elastic, the company developing enterprise search engine Elasticsearch and the Elastic Stack, has decided to make core Elastic Stack security features accessible to all users …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility