Security

An Enterprise Approach to Data Security

An Enterprise Approach to Data Security

To ensure enterprise-wide security, organizations must employ a more holistic strategy.

 
Managing Corporate Spreadsheet Risks

Managing Corporate Spreadsheet Risks

Whether they hold confidential data or critical calculations, spreadsheets pose concrete risks.

 
Notepad: Risk in Review – November

Notepad: Risk in Review – November

A dire global warming prediction, a deadly earthquake strikes Indonesia, and more.

 
The Paper Threat

The Paper Threat

Organizations often overlook the information security threat posed by paper.

 
Hack the Vote 2: Cyberrisks to Election Infrastructure

Hack the Vote 2: Cyberrisks to Election Infrastructure

Since we last covered cyberthreats to U.S. election infrastructure, the risks have become far more real. While much has changed, problems remain.

 
What Is the California Consumer Privacy Act?

What Is the California Consumer Privacy Act?

Businesses will face a wide range of obligations under California’s new data protection law.

 
GDPR and the Role of the Data Protection Officer

GDPR and the Role of the Data Protection Officer

Hiring a data protection officer is a key tenet of the GDPR, but what exactly does that entail?

 
Timehop Provides GDPR Compliance Test Case

Timehop Provides GDPR Compliance Test Case

In July, a U.S. company became one of the first to disclose a data breach under new EU rules.

 
Using the Dark Web to Mitigate Risk

Using the Dark Web to Mitigate Risk

Exploring the dark web can give companies insight into cyberthreats they may face.

 
Companies Failing to Reel in Phishing Risks

Companies Failing to Reel in Phishing Risks

Organizations admit their teams are not knowledgeable enough to identify and stop email-based threats, and the C-suite only adds to the risk.

 
Developing a Formal Cyber Incident Response Plan

Developing a Formal Cyber Incident Response Plan

The prevalence of data breaches and stricter standards and regulations have made cybersecurity incident response plans a necessity for organizations.

 
Cryptojacking: How Hackers Steal Resources to Mine Digital Gold

Cryptojacking: How Hackers Steal Resources to Mine Digital Gold

Hackers are increasingly launching attacks that leech computing power and electricity to surreptitiously mine digital currency.

 
Mobile Devices: The Next Frontier for Hackers

Mobile Devices: The Next Frontier for Hackers

As more employees use mobile apps for work, IT departments face new security challenges.

 
A Crash Course in Data Breach Readiness

A Crash Course in Data Breach Readiness

These seven steps will make organizations more resilient in the face of a cyberattack.

 
Notepad: Risk in Review – July/August

Notepad: Risk in Review – July/August

Banning plastic straws, South Korea’s new workweek, digital privacy laws, and more.