Is Your Data Breach Response Plan Effective?
Is Your Data Breach Response Plan Effective?

We’ve posted many times about the importance of having a data breach response plan in place. Indeed, the FTC just released its own guidance on data breach response. A new study, however, demonstrates that “having a response plan is simply not the same as being prepared,” particularly if that response plan is not kept up to date. New Ponemon Survey Ponemon surveyed 619 executives and staff employees who work...

READ MORE
New Approaches Needed to Address Cloud Security
New Approaches Needed to Address Cloud Security

The shift to the cloud has significantly increased the risks to data security, although the cloud itself is not necessarily to blame. As has been demonstrated, many cloud purchases are made outside the control or oversight of IT, creating a dangerous Shadow IT environment that, when left unmanaged, places corporate data at risk. At the same time, organizations have struggled to adapt their security technologies, with legacy security tools...

READ MORE
Webinar: Remembering the User in your Layered Security Model
Webinar: Remembering the User in your Layered Security Model

Security professionals have been proselytizing the benefits of layered security or defense-in-depth for a long time. The more layers you build in your security model, the more likely it will be that one (or some) of your defenses will detect anomalous or malicious behavior before it does any real significant damage to your network or infrastructure. Enterprises around the world are constantly being pitched with the latest and greatest...

READ MORE