The cost of a data breach can throw businesses into turmoil and derail careers. And that cost continues to rise. The potential for significant damage is massive on servers like IBM's Power Systems servers running IBM i, because they're widely used for database management, financial data processing, and business...
As threat actors refine their attacks and their automation, potential victims need to find new ways to scale up their cybersecurity to defend against these threats. Imperva CTO Amichai Shulman discusses how.
Health insurer Anthem has agreed to a proposed $115 million deal to settle a class action lawsuit over a 2015 cyberattack that resulted in data breach affecting nearly 78.9 million individuals. If approved, lawyers say it would be the largest data breach settlement ever.
Publicis Groupe CISO Thom Langford discusses how best to measure your organization's true risk appetite and the business value of blending storytelling techniques into your security awareness programs.
Security leaders face more threats than they'd like, but with fewer security personnel than they need. Aaron Miller of Palo Alto Networks discusses the case for new automated security solutions.
From nation-states to organized crime and malicious insiders, organizations are under siege from a variety of adversaries and threats. But how do they focus on the ones that matter most? James Lyne of Sophos offers insight.
The latest edition of the ISMG Security Report leads off with a look at why organizations turn to paper when critical systems can't be secured. Also, how to hack air-gapped systems over the internet.
The back story behind the ransom attack that led to the unauthorized early release of the Netflix series "Orange Is the New Black" is a cautionary tale in dealing with cyber extortionists such as The Dark Overlord.
The challenges presented by the Internet of Things (IoT) evolution are not dissimilar to those that were posed by the Bring Your Own Device (BYOD) phenomenon as it took hold. But what will it take for organisations to maximize returns from this technology, while mitigating risks?
Download this whitepaper and learn...
Companies in all sectors are faced with substantial challenges to prepare for GDPR. Regulators and supervisory authorities in charge of data protection wield a number of hefty sticks with which to enforce the new regime under GDPR.
To help your organisation prepare, download this whitepaper and learn:
If GDPR is...
Does a ransomware infection count as a reportable data breach? When a financial or healthcare gets hit with ransomware, does that violate their compliance of consumer data?
Since the data is just accessed, but not exposed to outsiders, does this mean that the victim doesn't have to notify authorities and consumers...
Enterprises that develop a mobile strategy and implement the right solution can expect significant benefits, as can those that update their existing strategy to keep pace with the evolving enterprise mobility landscape. Mobility is a journey, and to begin, it's useful to understand where your organisation falls on the...
Healthcare providers have always been attractive targets for data breaches. Why? The value of a health record is high. According to Reuters, health records are 10 to 20 times more valuable than credit card numbers.
Since healthcare providers depend heavily on patient information, ransomware protection is critical....
Ransomware can be devastating, but it doesn't have to be. By combining sophisticated analytics with access management, you can protect yourself from ransomware with rapid detection, optimized access controls, and data-driven recovery.
Download this whitepaper to learn:
How to detect and respond to ransomware...
The long-running data security dispute between cancer testing laboratory LabMD and the Federal Trade Commission is now in the hands of a panel of appellate court judges, who heard oral arguments this week. Experts weigh in on the significance of the case.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.