People today are often rightfully skeptical about sharing their information with companies and service providers. Large-scale data breaches, like the recent exposure of the personal data of 533 million Facebook users, can quickly disillusion consumers and tarnish brand trust. Nevertheless, consumers are required to hand over their personal information each time they sign up for a […]
How Much Redundant, Obsolete, Trivial Data Do You Have?
Click to learn more about author Gary Lyng. Data is created at such a high volume that many IT executives simply don’t know what to do with it. In fact, many executives likely have no idea how or where their company’s data is stored, whether it’s been replicated, or what their internal Data Management practices […]
A Cybersecurity-First Strategy Requires More Than Employee Training
October is Cybersecurity Awareness Month! All month long, we’ll be exploring cybersecurity-related topics to help you (and your data) stay safe online. Click to learn more about author Danny Lopez. In many organizations, training is viewed as one of the most efficient, cost-effective ways to educate employees on cybersecurity. While it’s more affordable than technology […]
Three Tips for Safeguarding Against Data Breaches
Click to learn more about author Balaji Ganesan. Sources indicate 40% more Americans will travel in 2021 than those in 2020, meaning travel companies will collect an enormous amount of personally identifiable information (PII) from passengers engaging in “revenge” travel. In a near 100% digital world, sensitive information including credit card numbers, email addresses, phone numbers, COVID-19 […]
Five Tips for CMOs to Ensure Company and Data Security
Click to learn more about author Cindy Zhou. As the chief marketing officer (CMO) of a cybersecurity software company, I spend a lot of time on data security for our content marketing. However, in many organizations, security is a frequently overlooked area for marketers. In today’s business landscape, brand reputation – a job heavily supported […]
Will AI Take Over Jobs in the Future?
If you ask, “Will AI take over jobs in the future?” to a group of people around you, you will likely get different opinions. Some may say that “no, AI will make our work easier” and others may say that “yes, we will surely lose our jobs.” It’s a debatable topic and has been a […]
Why Data Privacy Should Be a Core Aspect of Protecting Human Rights
Click to learn more about author Deepak Gupta. The U.N. Declaration of Human Rights recognizes privacy as one of the most basic rights that should be afforded to everyone. But the inherent openness of the internet and the ability of a person to access information from the other side of the globe mean that Data Governance is […]
Mastercard Acquires RiskRecon to Enhance Cybersecurity Capabilities
According to a recent press release, “Mastercard today announced an agreement to acquire RiskRecon, a leading provider of artificial intelligence and data analytics solutions to support companies in protecting their cyber systems and infrastructure. In a rapidly evolving digital world, cybercrime is a pertinent threat to business. Large-scale data breaches and ransomware attacks place billions […]
Seven Reasons Why Data Loss Prevention Is Necessary for Business
Click to learn more about author Gilad David Maayan. Data is vital not only for business continuity but also for business survival. Organizations that experience data breaches may suffer from financial and reputational losses and a decrease in productivity – and if the breach isn’t handled properly, the organization may face bankruptcy. Data Loss Prevention […]
SafeBreach Releases New Platform Capabilities to Identify and Mitigate Security Gaps
A recent press release reports, “SafeBreach Inc, vendor of the industry leading Breach and Attack Simulation platform announced the availability of SafeBreach GRID(™) – Global Risk Director. SafeBreach GRID is the industry’s only breach and attack simulation application that uses correlative analytics to identify security gaps and link them to their potential business impact. Existing […]