Category: Data Breach

09 Jan
Categories : Compliance, Cyber War, Data Breach, Data Protection, Data Security            Leave a comment           

Every country has secrets. Every government has data or information that it simply cannot afford to lose or have stolen. Whether it’s strategic military positioning, government-owned ‘Big Data’ or even citizen ID or voter data governments have long had a need for High Assurance computer systems protection and cyber intelligence defences. Now though things are changing.  Lines are blurring.  With everything coming online from the global financial system to the power grid and national transportation networks, the distinction between Government, […]

2016 – An Eventful Year for Pop Stars, Politics and Data Breaches

Posted By: Peter Galvin, @Pgalvin63 on Twitter
14 Dec
Categories : Data Breach, Data Security            Leave a comment           

Most people will agree that 2016 has been a pretty eventful year one way or another. We’ll leave it to the entertainment writers to eulogise over the passing of Prince and David Bowie, and the pundits can debate the possible political ramifications of Brexit and President Trump; I’m going to take a brief look back at the year through a data security lens. As well as the political and cultural bombshells, a number of very high-profile data breaches have hit […]

Reducing the Risk of Data Breaches for U.S. Federal Organizations

Posted By: Wayne Lewandowski, @Wayne42675 (Twitter)
03 Aug
Categories : Data Breach, Data Breach Disclosure, Data Encryption            Leave a comment           

Einstein’s definition of insanity is doing the same thing over and over again and expecting different results. And if Einstein said it, it must be true, right? Using this definition, I would argue that many IT security professionals at U.S. federal organizations suffer from cyber insanity – and here’s why… According to Gartner, the world-wide cybersecurity market topped $75 billion in 2015, and is expected to increase to $170 billion by 2020. And of the billions spent annually on information […]

Brexit: In this climate of uncertainty, Cybercrime remains constant

Posted By: Louise Bulman, AVP of EMEA | Vormetric, A Thales Company
14 Jul
Categories : Brexit, Data Breach, Data Breach Disclosure, Data Encryption, Data Protection            Leave a comment           

In the wake of the UK’s recent decision to opt out of the EU, many UK businesses are facing a period of uncertainty. With the decrease in the value of the pound and fears over a widening IT skills gap, it is understandable that cyber security might be low down on the agendas of some UK companies. The truth of the matter is, though, that cybercrime is not going anywhere. Indeed, some experts are predicting that it will, in fact, […]

10 Dec
Categories : Data Breach, Data Breach Disclosure, Data Security            Leave a comment           

Twas’ the nightmare before Christmas, when all through the store, All IT departments were stirring, when news of the Target breach came ashore. The shoppers awoke to find their data handled without care, In hopes that IT soon would be there.  When breach fallout ensued there arose such a clatter, Shoppers looked to executives to see what was the matter. Along came customer churn, and the retailers’ profits fell back, And it was the CEO and CIO who had to […]

Trick or Data Breach

Posted By: Michael Rothschild, @mjrothschild
04 Nov
Categories : Data Breach            Leave a comment           

Did you know that on an average day, upwards of 50% of your most sensitive data leaves your domain? Think about it, every evening, your employees go home along with not only what is in their head, but also what is on their computer. While some companies are still blissfully unaware of this, others are painfully aware and have taken measures to control the “insider threat”. Best practice is to not only to thwart attacks that are perpetrated by rogue […]

07 Jul
Categories : Compliance, Data Breach            Leave a comment           

The Rules and Regulations Chances are you’ve heard a lot about compliance standards, especially if you are a CSO, CTO or CIO (and if you’re in-house counsel, chances are you have said compliance standards memorized). Lawmakers and regulators around the world are enhancing existing data security compliance requirements, implementing new legal frameworks and defining new data security regulations to respond to increasing internal and external hazards. ClickToTweet: Compliance is Fighting Today’s Battles by Yesterday’s Rules @kessalan #DefenderOfData In a […]

The Ramifications of the IRS Data Breach

Posted By: Alan Kessler, @kessalan
04 Jun
Categories : Data Breach, Data Breach Disclosure            Leave a comment           

Last week, the IRS experienced a data breach affecting more than 100,000 citizens. The hackers accessed an IRS online system in order to obtain the personal information of taxpayers. News on this story has since generated a huge amount of coverage in major news outlets. Upon disclosing the attack, the IRS also stated the matter was under review by the Treasury Inspector General for Tax Administration as well as the IRS’s Criminal Investigation unit. ClickToTweet: Ramifications of the IRS Breach […]

Categories : Data Breach, Data Breach Disclosure, Data Encryption, Data Security            Leave a comment           

The state of security and data breaches is no song and dance matter. We all know 2014 wasn’t shy of data breaches. We saw companies – once thought of as impenetrable – hacked. In this layout of the World’s Biggest Data Breaches, it’s clear the outlook is meek. While 2014 may have been a whirlwind of security vulnerabilities, just three months into 2015 we’ve already seen breaches at Uber, Anthem, the hotel chain Mandarin Oriental, Gemalto and others. ClickToTweet: With […]

12 Feb

When it comes to data security, identifying what you consider your crown jewels is the first step in the data security recovery program. Legacy products can be expensive and negatively impact performance. Organizations need to realize that the complexity and fear of access control is a thing of the past. ClickToTweet: Why a Data Security Platform is an Enterprise Priority #DefenderOfData Before we get started on recovery, here are a few things you need to ask yourself: How much […]