Defensible risk management can improve your job security
If your organization suffers a data breach, your job security might hinge on whether you’ve practiced defensible risk management. Don’t make these mistakes.
Posted in Data Breach Security
If your organization suffers a data breach, your job security might hinge on whether you’ve practiced defensible risk management. Don’t make these mistakes.
Posted in Data Breach Security
Closing your office cuts off several attack vectors—but remote working creates thousands more. Here’s why a red team assessment is so essential right now.
Posted in Data Breach Security
A recent report recommends a national cyber incident reporting law. But how do we help organizations report data breaches if they fear regulatory sanctions?
Posted in Data Breach Security
How do you comply with privacy laws that haven’t even been enacted yet? Start by securing your software and systems against cyber attacks and data breach.
Posted in Data Breach Security, Software Compliance, Quality & Standards, Software Security Program
Prevent different types of social engineering attacks, targeting everyone from CEOs to gamers to smart appliance users, with the right training and tools.
Posted in Data Breach Security
The cost of a data breach is expected to rise owing to GDPR, CCPA, and other privacy regulations. Here’s what the most expensive data breaches cost in 2019.
Posted in Data Breach Security, Security Standards and Compliance
How do you evaluate the impact of a data breach? Here are six of the biggest data breaches in 2019 in terms of millions, even billions, of people affected.
Posted in Data Breach Security
What are the biggest cyber security threats in 2020? We asked some experts, who warned us about insider threats, disinformation, privacy, IoT, 5G, and more.
Posted in Application Security, Data Breach Security
To prevent data breaches, practice these two fundamentals: shift left (perform application security testing early and often in your SDLC), and always patch.
Posted in Data Breach Security
The AMCA breach hammers home the need for supply chain security. Here’s how to vet your vendors so you can keep from becoming the next Quest or LabCorp.
Posted in Data Breach Security, Healthcare Security & Privacy, Software Security Program