What is FISMA Compliance? (Definition, Requirements, Penalties, & More)
Learn about the role of data protection in achieving FISMA compliance in Data Protection 101, our series on the fundamentals of information security.
Learn about the role of data protection in achieving FISMA compliance in Data Protection 101, our series on the fundamentals of information security.
Learn about the role of data protection in achieving FISMA compliance in Data Protection 101, our series on the fundamentals of information security.
There hasn’t been much to admire about Yahoo’s handling of serial data breaches. Docking CEO Marissa Mayer’s bonus is one decision others should follow.
The Internet’s security infrastructure is incredibly fragile, and every once in a while a small fragment of it comes loose and breaks all over the floor. Depending upon the importance of the piece, the mess can sometimes be swept up quickly before anyone notices. That is most decidedly not the case with the recent demonstration of a practical collision in SHA-1.
The leak late last year of information on more than 200,000 patients of CoPilot Provider Support Services was just the first act in what is proving to be a bizarre and mysterious HIPAA ‘whodunnit.’
The leak late last year of information on more than 200,000 patients of CoPilot Provider Support Services was just the first act in what is proving to be a bizarre and mysterious HIPAA ‘whodunnit.’
Our Definitive Guide to Data Classification series concludes with guidance on how to set yourself up to succeed and keep your sensitive data safe.
One in four Americans was the victim of data theft, but policy makers can’t find the spirit to act.
One in four Americans was the victim of data theft, but policy makers can’t find the spirit to act.
The latest news on Yahoo’s massive data breaches highlights the most important consideration for any security incident: the impact these events can have on a company’s bottom line.