What is Security Incident Management? The Cybersecurity Incident Management Process, Examples, Best Practices, and More
Learn about the security incident management process in Data Protection 101, our series on the fundamentals of information security.
All the Pieces Matter
Anyone who owns a mobile phone likely understands at this point that their device’s location can be tracked in real time in any number of different ways. Carriers, advertisers, Google, Apple, and other companies all have a highly accurate picture of where a device is at any given time. That’s part of the devil’s bargain we’ve all made in order to have space phones in our pockets.
Is a ransomware infection always a data breach? Yes.
FedEx’s disclosure of a material impact from NotPetya last week highlighted the awkward two-step that companies play around malware outbreaks and data breaches.
Devil’s Ivy and the Future of IoT Security
Security researchers have discovered a serious, remotely exploitable vulnerability in a code library that’s present in potentially tens of millions of devices, mainly Internet-connected security cameras.
Perimeter Security Investment and the Sunk Cost Fallacy
Why do organizations continue to invest in perimeter security even when data suggests it is not stopping hackers? Because of how much they’ve already invested in perimeter security, of course!
The Early Indicators of an Insider Threat
Whether malicious or negligent, insider threats pose serious security problems for organizations. Forrester Senior Security Analyst Joseph Blankenship offers some insight into common early indicators of an insider threat.
What is Security Analytics? Learn about the Use Cases and Benefits of Security Analytics Tools
Using security analytics tools, enterprises and smaller organizations alike are better equipped to collect as much useful data as possible to improve detection and provide proactive alerts for attempted attacks or incidents that are in progress.
The Evolution of Cybercrime: A Q&A with Dan Cohen, RSA Fraud and Risk Intelligence
RSA’s Dan Cohen discusses current trends in cybercrime, from shifting tactics to the commercialization of the digital underground.
Survey Uncovers Epidemic of Data Theft at Law Firms
A survey of law firms finds two thirds reported a breach in 2016, with lax security practices to blame.
Three Key Challenges Driving the Resurgence of DLP
Why are companies becoming more and more interested in Data Loss Prevention (DLP) solutions? Forrester’s senior analyst, Heidi Shey, explains why a DLP resurgence has occurred in the past few years and mentions some of the key criteria for evaluating DLP Suites.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.