general

Browse by

Clear

general

FedRAMP Compliance: What you need to know?

FedRAMP is a U.S. government-wide program that delivers a standard approach to the security assessment, authorization, and continuous monitoring of cloud products and services.

general

Do You Need A Data Analytics System?

Data analytics (DA) involves processes and activities designed to obtain and evaluate data to extract useful information. The results of DA may be used to identify areas of key risk, fraud, errors, or misuse; improve business efficiency, verify process effectiveness, and make more-informed business decisions.

general

Tips to Leverage the Investment in the Shared CISO

In April this year, Georgia Institute of Technology announced that they suffered a security breach leading to unlawful access to personally identifiable information of about 1.3 million students and staff. An internal investigation found that the unauthorized access to their network occurred in December 2018.

general

Combatting the Security Risks of Cloud Computing

Small and large enterprises continue to benefit from increased digitization and greater use of cloud-based application and storage facilities. Cloud services are making it possible for businesses to place their information and data in “containers” that can be deployed consistently and reliably.

general

The Reason why Application Leaders should care about Privacy and Data Protection

As of July 2018, downloadable apps on the Apple App Store reached 3.2 million. Data shows that social media applications are the most frequently used, allowing people to connect — and download other supporting apps. As people spend more time on their mobile phones, programming and production of apps are growing exponentially. While developing these products increases visibility and brand value for companies, it is equally important that leaders heed security guidelines.

general

Developing Safeguards to Combat the Rise of ATM Malware

ATM is one of the great convenience of this modern financial age. However, ATMs have been plagued with increased attacks as criminals are exploiting hardware and software vulnerabilities to exploit ATMs to obtain large sums of cash.A Trend Micro andEuropol2017 Report[1] highlighted that the use of ATM malware has evolved significantly as the scope and scale of these attacks have grown. This latestdevelopment is attributable to several factors.

general

Boosting Your Security Posture with Security Analytics

With the rise of cyberincidents, organizations continue to search for effective tools and strategies to fight against cybercrimes and to build resilience in their environment. Based on the 2017 Trustwave Report[1], cyberincidents were spread across economic sectors and regions during the reporting year. Every single region was affected, with North America and the Asia-Pacific regions accounting for the bulk of reported cases (70%). The retail industry had the single largest share of cyberincidents (22%), followed by the food and beverage (20%), financeand insurance (14%), hospitality (12%). Technology, transport, entertainment, travel and other sectors accounted for the remaining 32%. These revealing statistics emphasize the continued urgent need for organizations to shore up the cybersecurity defenses while proactively engaging in offensive tactics.

general

The Business Impact of Unsecured Mobile Devices

In 2016, it was discovered that mobile device breaches cost enterprises millions of dollars.Lookout, a global leader in mobile security, and Ponemon Institute conducted a study on the economic risk of mobile data breaches, as well as potential maximum losses. They found during their research that losses could be as high as $26.4 million. There were 588 IT and security leaders from the Forbes Global 2000 companies who participated in this study. Researchers examined the risks introduced by employee access to increasing amounts of corporate data via their mobile devices and then assigned a cost to any mobile-based breach.

general

The Need for Ongoing Security Awareness Training

Humans are often regarded as the weakest link in a security breach. According to a study from CompTIA conducted in 2015, which surveyed people from several organizations in the United States, human error represents 52 percent of the cause of security breaches.[1] Businesses spend large amounts of money annually on security solutions but fail to properly address the human element of information security. Human error, whether accidental or malicious, can cause serious security risks or breaches.

general

Your Alma Mater is Breached – Should You Care?

In 2015, the higher education industry experienced 165 security incidents.[1] This year, seven higher education institutions withstood malicious, large-scale data breaches.No higher education institution of any size or prestige is immune to security threats.[2] A compromised security infrastructure can cripple reputation and moreover, result in financial loss.

Subscription Center

Stay in the Know with Our Newsletter