Hord Tipton, a retired federal executive who spent more than five years as chief information officer of the Department of the Interior, says it was "chilling" to learn he is one of the more than 22 million victims of the Office of Personnel Management breaches.
This document describes the business problems which privileged access management systems are intended to address. It goes on to describe best practices for defining and enforcing policies regarding discovering systems on which to secure access to sensitive accounts, updating and storing privileged passwords and...
In 2014, mobile devices and the concept of "staying connected" permeated our personal and professional lives at nearly every level. Now more and more companies are realizing the importance of having the infrastructure in place for mobile devices and are currently playing catch-up. Read this whitepaper to learn about...
It has quickly been proven that the unification of mobile app and network security technologies improves customer value by allowing access from multiple devices allowing for uninhibited access to work from wherever. However, with such a transition always come security and implementation issues. Read this whitepaper...
Mobile devices have been connecting to corporate networks for nearly a decade now, and in that decade companies have attempted to adapt a wide range of existing security and access products to help companies to build secure access solutions for mobile devices. Now that mobile device access is inevitable for nearly...
How much of your organization's retained electronic content has no business or legal value?
Is it simply digital detritus, retained because 1) you think you might need it sometime, 2) you forget about it, or 3) you don't have policies and software in place to get rid of it?
This unnecessary accumulation of...
With the number of organizations that allow BYOD expected to grow exponentially, it becomes even more important for organization's to have the right foundation to support their employees and their customers. Read this whitepaper to learn how to achieve an app centric approach to enterprise mobility and see how this...
A day after the Office of Personnel Management confirmed that security breaches exposed to hackers the personal information of more than 22 million individuals, Katherine Archuleta has resigned as director of the agency.
As the U.S. Office of Personnel Management total breach victim count hits more than 22 million, many lawmakers are calling for the OPM's director to be fired. Meanwhile, the White House says it's weighing its response against the hackers responsible.
Building a business case to justify fraud-prevention technology investments is, unfortunately, not as straightforward as one might expect. The impact of online fraud on a financial institution is multifaceted and complex. Fraud incidents and fraud-prevention efforts affect many aspects of the bank's services and...
You work hard to maintain your organization's reputation as a trusted financial advisor, and with good reason. Because many banks offer similar services and interest rates, one of your greatest differentiators, from your customers' perspective, is service.
Download this white paper to explore:
The need for an...
The European Central Bank (ECB) Recommendations For The Security Of Internet Payments sets forth numerous recommendations for European banks to enhance online fraud prevention practices. The ECB recommendations are more expansive and detailed, yet fundamentally similar to the US Federal Financial Institutions...
News headlines about the increasing frequency of stolen information and identity theft have focused awareness on data security breaches - and their consequences. In response to this issue, regulations have been enacted around the world. Although the specifics of the regulations may differ, failure to ensure compliance...
Given the potentially disastrous consequences of a breach, it is important for IT and security leaders to be aware that there are simple and extremely cost efficient steps that any organization can take immediately to improve protection and reduce risks.
How can your organization reduce risk by taking a proactive...
Data security presents a multidimensional challenge in today's complex IT environment. Multiple access paths and permission levels have resulted in a broad array of security threats and vulnerabilities. Traditional "fortress approaches" such as firewalls and IDS/IPS systems are no longer sufficient to defend against...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.