December 16, 2015 MacKeeper Drops the Ball as Account Details Land in Public Database 2 min read - A white-hat hacker recently discovered sensitive account details for a reported 13 million MacKeeper users have been sitting exposed in a public database.
Data Protection December 15, 2015 My Employees Are in a Data Breach! What Now? 3 min read - As a CISO, what can you do when your employees are involved in a data breach? What should you know about their potential involvement beforehand?
CISO December 11, 2015 With 2015 Cybersecurity Challenges in the Rearview, 2016 Presents New Opportunities 7 min read - 2015 had a lot of cybersecurity challenges, but many of these incidents have set up 2016 to be a year of opportunities for individuals and enterprises.
Malware December 10, 2015 POS Malware and Loyalty Card Fraud Growing in Popularity 3 min read - As shoppers head to stores during the holiday season, enterprises need to ensure they are protected from POS malware and loyalty card fraud.
Data Protection December 8, 2015 The Million-Dollar Data Privacy Question: Is Your Data Secure? 3 min read - New legislation in the European Union will change the way organizations handle data privacy and compliance. Here's what your organization needs to know.
December 2, 2015 VTech Breach: Is Stealing More Than 6 Million Accounts Now Child’s Play for Malicious Actors? 3 min read - Chinese toy manufacturer VTech suffered a hack that put the personal information of adults and children at risk. How can people protect themselves?
Healthcare December 1, 2015 The Year of the Health Care Industry Security Breach 4 min read - The health care industry is increasingly being targeted by cybercriminals who are clamoring after personal health information and electronic records.
Endpoint November 30, 2015 Give Your Customers Peace of Mind This Holiday Season With PCI Compliance 2 min read - PCI compliance may be the best gift you can give customers this holiday season. Consider the ways being compliant can protect your business and consumers.
Data Protection November 25, 2015 Big Data Opportunities Need Big Data Security 3 min read - The adoption of big data analytics is a rapidly growing trend. If you want to reap the benefits of these platforms, you need comprehensive data security.
Endpoint November 19, 2015 Simple Mobile Security Steps to Protect Health Information 3 min read - Mobile security strategies must be upgraded in order to keep protected health information secure across all access points and endpoints.