Key security strategies for data breach prevention

If we have learned anything over the last few years about data breaches, it is that they are likely to […]

Full Details

Point/counterpoint: Breach response and information sharing

Some breaches require notification such as those involving patient data or customer information, but sharing is optional. Of course, notification […]

Full Details

The Largest Internet Security Breach in History

The largest internet security breach in history has just been discovered. Hold Security, a small cybersecurity firm, first reported the […]

Full Details

Data Security Breaches at Retailers

Security breaches and identity theft are becoming an increasing concern for consumers as hackers continue to target large retailers. Target, […]

Full Details

Twas the Night before the Breach

Twas the night before the breach, when all through the place Not an alarm was ringing, nor even a trace […]

Full Details

Companies with Virtual CSOs get ahead without losing an arm and a leg

Security remains a complex discipline.  This ever-changing challenge grows in complexity daily as new threats emerge and compliance requirements increase.  […]

Full Details

Ineffective Security Policy Adherence Results in Another Data Breach

The Florida Department of Juvenile Justice (DJJ) had a mobile device containing 100,000 youth and employee records stolen on January […]

Full Details