Perimeter Security Investment and the Sunk Cost Fallacy
Why do organizations continue to invest in perimeter security even when data suggests it is not stopping hackers? Because of how much they’ve already invested in perimeter security, of course!
Why do organizations continue to invest in perimeter security even when data suggests it is not stopping hackers? Because of how much they’ve already invested in perimeter security, of course!
A survey of law firms finds two thirds reported a breach in 2016, with lax security practices to blame.
Global cybercrime costs could reach $2 trillion by 2019. That’s up 3X from 2015, which was only a paltry $500 billion by comparison. Surprisingly, though, hackers should be the least of your worries.
Securing PII is a critical component of many data privacy regulations as well as a valuable way to gain customer trust – here are 10 steps to help keep PII protected within your organization.
A study by the firm BitSight finds a correlation between out of date software, data breaches, and other cyber incidents.
Threat awareness is paramount to delivering on the promise of data protection – here's why and where to start.
After a string of high profile breaches, the FDIC is still struggling to implement a security program and control access to its network, GAO found.
19 security professionals and business leaders share their top tips for protecting unstructured data.
The threats of intellectual property theft and industrial espionage weigh heavily on manufacturers, according to this year’s Data Breach Investigations Report from Verizon.
A robust healthcare data protection program goes beyond compliance - here are some tips for protecting healthcare data against today's threats.