September 10, 2015 Identify Theft Accounts for 75 Percent of the Top Breaches in 2015 2 min read - A recent report from Gemalto detailed the top breaches from the first half of 2015 and showed that identity theft is a prevailing trend in cybercrime.
Endpoint September 1, 2015 Keeping Your Data Safe: How to Build an Endpoint Security Strategy Based on Confidence 3 min read - Is your organization approaching its endpoint security with confidence or fear? Your answer could impact how effectively you prevent data breaches.
Fraud Protection August 27, 2015 Why Tax Refund Fraud Losses Are Growing Rapidly 8 min read - Tax refund fraud is catching the attention of cybercriminals, who are committing identity theft to claim a piece of this billion-dollar industry.
Data Protection August 26, 2015 Blurred Lines: Researching the Ashley Madison Data 4 min read - Ashley Madison's recent data dump provided security researchers with a treasure trove of information — but is looking into the breach completely legal?
August 25, 2015 Reality Bites: Virtualization Increases Cost of Security Breaches 2 min read - A new study reports that virtualization can significantly increase the cost of recovery after a security breach. Is this the new reality?
August 25, 2015 The Ashley Madison Security Breach: An Affair to Remember? 2 min read - The Ashley Madison security breach has everyone talking, but what's the takeaway from this affair for corporations looking to improve cybersecurity?
Data Protection August 17, 2015 Analyze, Protect, Adapt: Could You Win the Data Security Triple Crown? 4 min read - Winning the Triple Crown of data security means being able to protect your sensitive information while also analyzing and adapting your security practices.
Banking & Finance August 13, 2015 Stock Price May Not Tell the Whole Story About Security Breaches 3 min read - A company's stock price may not be drastically affected by a data breach, but that doesn't mean the impact of a cyber event is small.
Retail July 23, 2015 Building a Loyalty Program That Doesn’t Reward Cybercriminals 2 min read - A loyalty program is framed as a win-win for organizations and their customers, but it can also offer prizes for cybercriminals if not managed properly.
Data Protection July 22, 2015 The Mishandling of Sensitive Data: Do You Really Know What You Don’t Know? 3 min read - Carelessness with data handling creates many unnecessary risks. Here are some examples of this neglect and what you can do about it.