When it comes to electronic security, protection goes beyond the devices and technologies that help keep businesses and people safe. The relationship you establish with your security integration partner plays an important role as well. When making decisions about electronic security strategy and technology, look for a security integration partner who exhibits the intangibles, like trust and transparency. Think about …
IoT Cybersecurity Improvement Act Calls for Deployment Standards
The IoT Cybersecurity Improvement Act calls for deployment standards for IoT-connected devices. That’s not only a very smart move for the Federal government, it could have far-reaching implications for the private sector, and for consumers, as well. And that? That’s a very good thing.
Capital One Breach — A Terrible, Horrible, No Good, Very Bad Day
The Capital One breach is a terrible, horrible, no good, very bad day for the brand, and just another day of exposure and personal risk for consumers. There’s a reason that every major tech brand is focused on cybersecurity: Dell, IBM, Cisco, SAP, and others understand fully that business can’t be business as usual if customers are vulnerable to hacks. Now we just need to move cybersecurity up the food chain so that it’s a top concern from senior management and the boardroom on down—and fund it.
Massive GDPR Fines Mean Investors, Board Members Rethink Cybersecurity
The news of the massive GDPR fines levied against British Airways and Marriott has gotten the attention of CIOs. More importantly CEOs, investors, and board members are rethinking cybersecurity, realizing that a security-first mindset in all aspects of the organization is critically important.
Fast-Growing Startup in the SIEM Space No Real Threat to Splunk, IBM
Exabeam, a fast-growing startup in the SIEM (Security Information and Event Management) space is no real threat to Splunk, IBM. Here’s why.
5 Myths About Data Breaches
Not sure what’s fact and what’s fiction when it comes to data breaches? Check out the top five data breach myths we’ve heard of…and the reality behind them! Data Breach Myth 1: Only Major Companies get Targeted for Data Breaches Reality: Any company of any size can be the target of a cyber-attack. We often only see news reports about …
The Cybersecurity Disconnect: Addressing the Problem in the C-Suite
How committed is your company to cybersecurity? Recent reports show the answer isn’t very straightforward. In many cases, the CEO and CIO have different ideas of what data security means, and why it matters. It’s time to get both tech and business leadership on the same page in making data security a top priority. Understanding the Divide In a recent …
CyberSecurity—The Greatest Challenge CISOs Face Today
What a time to be alive! The rapid advances of technology and dawn of an era dominated by the Internet of Things (IoT) has changed pretty much everything about life as we know it. Which is why it’s no surprise that cybersecurity is perhaps the greatest challenge CISOs face today. But let’s back up. Why is the IoT such a …
Here’s How to Kickstart Your Data Protection Strategy
Many business leaders associate data protection with cyberattacks. Mainly, due to the alarming news stories that continue to surface—from the WannaCry ransomware attack that spread across 150 countries to Equifax’s massive breach that affected as many as 147.9 million consumers. Luckily, media coverage for these incidents has spurred much-needed awareness for data security. However, cyberattacks are just one concern when it …
Top Takeaways from 2018 Verizon Data Breach Investigation [Report]
As the number of threats and security breaches continue to grow, protecting your business from a cyber-attack takes a conscientious and sustained effort. Cybercriminals are expanding their forces and the assaults are becoming more sophisticated every day. If you aren’t fully engaged in your cyber security efforts you could be vulnerable. Do you know the biggest threats to your cyber …