It's Friday! Catch up on the top infosec headlines with our weekly news roundup.
Should businesses be liable for the pain and suffering experienced by customers as the result of a data breach? Lawmakers in Australia say “yes.”
Most people don’t pay a lot of attention to government technical guidance and regulations, which is completely understandable. They’re government regulations, after all. But sometimes, buried deep inside these dense bureaucratic reports, there is some guidance of actual value, and the new authentication guidelines from NIST is one of those rare documents.
BYOD remains both a major opportunity and challenge for enterprises. By following the right approach to identifying BYOD risk and developing effective BYOD policy it is possible to capitalize on the benefits of BYOD without adding significant risk.
Our Definitive Guide to DLP series concludes with two frameworks for meeting your long-term DLP goals.
The hack of Newkirk Products, a little known provider of medical ID cards, underscores the dangers third parties pose to regulated health data.
The web was designed as an open platform, a way for people and machines to communicate with each other regardless of borders or other barriers. The network’s architects meant for it to remain that way, but over time it has gradually become more segmented, by nations as well as corporations, and that’s to the detriment of users everywhere.
More organizations are turning to managed security services to gain security expertise and lessen the workload of their in-house security staff. Learn more about this option in Data Protection 101, our series on the fundamentals of information security.