Click to learn more about author Ben Hartwig. Blockchain has grown rapidly in recent years, but cryptocurrency is not immune to security attacks. There are still cybersecurity risks to be aware of. Some cryptocurrencies have already been the victim of ransomware attacks and other security breaches by hackers. ZenCash and Ethereum Classic have both lost […]
Avoid Headaches This Year by Ensuring You Have a Backup Strategy in Place
Click to learn more about author JG Heithcock. At the start of every year, many businesses will dedicate time to comb through budgets, procedures, and quarterly plans in an effort to organize themselves for the year ahead. While some budgets account for antivirus software and other cybersecurity resources, many fail to calculate the costs of […]
2021 Enterprise Tech Predictions: Zero Trust, Machine Identity for AI, and Open Banking
Click to learn more about author Jasen Meece. 2020 brought massive disruptions due to COVID-19, and the abrupt shift to a remote workforce created holes in the cybersecurity landscape for malicious actors to exploit. Amid the pandemic, the harrowing spike in cyberattacks forced all enterprises, large and small, to take a closer look at potential […]
Cybersecurity Threats and Opportunities to Expect in 2021
Click to learn more about author Anurag Kahol. 2020 has been an extremely tumultuous year. From a cybersecurity perspective, multiple high-profile Twitter users’ accounts were hacked in a sophisticated Bitcoin scam, remote workers became the priority focus for threat actors amid COVID-19 stay-at-home orders, and California has a stringent data privacy proposition in the works […]
Don’t Overlook RO/BO (And Now HO): Tips to Manage and Protect Data at the Edge
Click to learn more about author Shridar Subramanian. Change is normal — but the pace of change in recent times has been anything but normal. For IT professionals that have helped their organizations shift to new work-from-home and remote models, the speed of change has been nothing short of dizzying and disorientating. IT managers are […]
The Security Champions of the Developer World
Click to learn more about author Anne Hardy. Organizations that want to secure applications are challenged by understaffed security teams and a lack of security awareness on the part of developers, reports Forrester. When developers do understand the importance of security and how to incorporate it into their work, they are security champions — often […]
How Personally Identifiable Information (PII) Is Evolving
Click to learn more about author Beth Shulkin. Personally identifiable information (PII) is any data used to identify an individual, such as social security number, phone number, or physical address. For years, merchants, banks, government agencies, and countless other organizations have relied on PII to service their customers, for processing transactions of online shoppers, approving […]
What’s the Difference Between a Data Breach and Identity Theft?
Click to learn more about author Ben Hartwig. The most revolutionary contributions to the modern world have been made by technology. Today, we cannot imagine a world without digitization and automation. However, where technology has made life quicker and more convenient for us, it has also produced an unfortunate byproduct — fraud. With people sharing […]
Tackling Data Breaches Through Information Security Systems
Click to learn more about author Sowmya Tejha Kandregula. While the terms “Data Security” and “Data Breach” have been around for a long time, they acquired a lot of traction a few years ago with the proposed implementation of data privacy regulations like the General Data Privacy Regulation (GDPR) and California Customer Protection Act (CCPA). By […]
Why CDOs Need a Bigger Budget Now for Data Governance
Click to learn more about author Amar Kanagaraj. The cybersecurity landscape has been undergoing a sea change, driven by growing data privacy concerns, ever-increasing security threats, regulations, and geopolitical factors. Recently, COVID-19 has fundamentally changed many definitions and structures for businesses. The current health crisis has brought data privacy and security vulnerabilities more sharply into […]