Norman Rohde, Vice President, Sales, EMEA, Novell, looks at how a data breach doesn’t always have to have a negative outcome.
Browsing: Breaches
Reports of the CyberVor attack has shocked many readers, but what surprised us was that the number of hacked sites seemed low for an attack of this scale.
The latest in a string of lawsuits between businesses and their banks over alleged cyber heists is between Tennessee Electric Company and TriSummit Bank.
According to a new study by Iron Mountain, 46 per cent of IT teams will insist on keeping data close at hand on hardware they can see, touch and control.
The latest eCustomerServiceIndex (eCSI) survey revealed that a majority of online shoppers surveyed asked for better online security.
Lucas Zaichkowsky, Enterprise Defence Architect at AccessData, comments on the CHS hack that compromised 4.5 million patients’ data.
Blake Brannon of AirWatch by VMware has compiled five tips to help companies successfully implement a BYOD strategy.
Now is the time to utilize your organization’s data with the latest machine learning technologies for anomaly detection.
Businesses across Europe would be advised to realize the risks to their sensitive information and enact changes to meet the new EU data protection reforms.
When we start mapping our efforts to the attacker’s infiltration steps (known as the cyber kill chain), we can focus our incident response efforts.