
We’ve posted many times about the importance of having a data breach response plan in place. Indeed, the FTC just released its own guidance on data breach response. A new study, however, demonstrates that “having a response plan is simply not the same as being prepared,” particularly if that response plan is not kept up to date. New Ponemon Survey Ponemon surveyed 619 executives and staff employees who work...
READ MORE
The shift to the cloud has significantly increased the risks to data security, although the cloud itself is not necessarily to blame. As has been demonstrated, many cloud purchases are made outside the control or oversight of IT, creating a dangerous Shadow IT environment that, when left unmanaged, places corporate data at risk. At the same time, organizations have struggled to adapt their security technologies, with legacy security tools...
READ MORE
Security professionals have been proselytizing the benefits of layered security or defense-in-depth for a long time. The more layers you build in your security model, the more likely it will be that one (or some) of your defenses will detect anomalous or malicious behavior before it does any real significant damage to your network or infrastructure. Enterprises around the world are constantly being pitched with the latest and greatest...
READ MORE