(Source: GlobeNewswire (press release)) TAMPA, Fla., Dec. 21, 2017 (GLOBE NEWSWIRE) -- A 2016 IBM cyber security intelligence report found that 60 percent of all cyber-attacks were related to, or directly the result of, insider activity. Cody Wray, Co-Managing Partner of Tampa FL based Adsero Security, observes that these securitybreaches often originate from ......
You Are Browsing ‘Security ’ Category
(Source: CSO Online) With each addition to the expanding Star Wars movieverse, IT security bloggers use the Galactic Empire (now the First Order) and the Rebel Alliance as analogies for companies and hackers. And why not? The saga that brought us the Jedi and Sith to teach us about good and evil, right and wrong, hope and despair, also ......
(Source: GlobeNewswire (press release)) OAKBROOK TERRACE, Ill., Dec. 21, 2017 (GLOBE NEWSWIRE) -- VASCO® Data Security International, Inc. (NASDAQ:VDSI), a global leader in digital solutions including identity, security and business productivity, today announced that it has joined the Cloud Security Alliance (CSA), the world's leading organization ......
(Source: Dark Reading) If security isn't aligned with the business objectives of the organization, then how can the securityprogram function effectively? Security always exists in context to something else, and that context is the organization's business objectives. If you're one of those 40% not aligning at all with your business goals, here are X ......
(Source: PR Newswire (press release)) This is where the data security of the blockchain technology is combined with drug molecular structure monitoring. This is important due to the fraudulent use of antibiotics that hurt people and contribute to global drug resistance to these medications. DAKOTA Life Sciences uses blockchain and genomics technologies to ......
(Source: Security Boulevard) Companies have moved to cloud data services faster than anticipated even in traditional industries like banking and healthcare where security is a key concern. As shown in Figure 1, take-up of cloud computing will continue to increase, attaining a compound annual growth rate (CAGR) of 19%, from $99B in 2017 to $117B ......
(Source: Mondaq News Alerts) Credit cards were a big concern in the era of data security 1.0. Breaches like TJX, Home Depot, and Target made national headlines. Fortunately, the adoption of smart cards with chips and improvements in advanced fraud detection rendered those types of breaches less profitable, and therefore less prevalent. So, cyber ......
(Source: CUinsight.com (press release)) In a joint letter, the trade groups call for a strong national data security standard and breach notification requirements. “Stopping breaches is critical for consumers, and also important to our members who often have the closest relationships with those affected,” the trades wrote. “Data breaches impose significant costs on ......
(Source: The Indian Express) True to its words, BlackBerry is ending the monthly security updates for the Priv after 2 years. “When we introduced our first Android device more than 24 months ago, we committed to delivering 2 years of monthly software updates for the Priv,” wrote Alex Thurber, Senior Vice-President and General Manager of BlackBerry's ......
(Source: CSO Online) The Mr. Robot series centers around the theme of online privacy and security. One of the 10 guiding principles of Mozilla's mission is that individuals' security and privacy on the internet are fundamental and must not be treated as optional. The more people know about what information they are sharing online, the more they ......