
Healthcare orgs have to achieve true cybersecurity, not only compliance
How many organizations in the healthcare sector are conforming with the HIPAA Security and Privacy Rules and the National Institute of Standards and Technology Cybersecurity …

The top emerging risks organizations are facing
Gartner surveyed 98 senior executives across industries and geographies and found that “accelerating privacy regulation” had overtaken “talent shortages” as the top emerging …

The surveillance economy has set its sights on smartphone sensors
The most successful companies of our time are those who’ve mastered user data – collecting it, analyzing it and profiting from it – typically at the expense of user privacy. …

WHOIS after GDPR: A quick recap for CISOs
2018 was a big year for data protection with the implementation of the General Data Protection Regulation (GDPR) last May — forcing CISOs and other professionals to rethink …

79% of organizations want a federal privacy law amid lack of compliance
There is a significant enthusiasm for a federal privacy law amid organizations’ lack of ability to comply with data privacy rules stemming from both mushrooming government …

Georgia Tech data breach: 1.3M students and staff potentially affected
The Georgia Institute of Technology, commonly referred to as Georgia Tech, has suffered yet another data breach. This time, the number of affected individuals may have reached …

Digital transformation goes hand-in-hand with Zero Trust security
Forward-looking organizations are investing in Zero Trust security and strong MFA, modern app development, IaaS, and digital transformation, a recently released Okta report …

Consumers concerned about privacy but willing to take risks for convenience
In today’s connected world, businesses are prime targets for cyber attacks and unintentional missteps can result in critical exposure of consumers’ sensitive personal …

45% of taxpayers do not securely store tax documents
Despite almost four in 10 (38 percent) taxpayers saying they are worried they will become a victim of tax fraud or tax identity theft during tax season, 45 percent admit to …

Automatically and invisibly encrypt email as soon as it is received on any trusted device
While an empty email inbox is something many people strive for, most of us are not successful. And that means that we probably have stored away hundreds, even thousands, of …

When it comes to file sharing, the cloud has very few downsides
Organizations storing data and documents they work on in the cloud is a regular occurrence these days. The cloud offers scalability in terms of storage and cloud services …

Guilty by association: The reality of online retail third-party data leaks
Online retail activity continues to accelerate at a rampant pace and shows no signs of slowing down. According to the National Retail Federation (NRF), U.S. retail sales are …
Featured news
Resources
Don't miss
- Cybersecurity and the development of software-defined vehicles
- Ransomware is up, zero-days are booming, and your IP camera might be next
- AI in the SOC: Game-changer or more noise?
- CISOs say they’re prepared, their data says otherwise
- Millions of Dell laptops could be persistently backdoored in ReVault attacks