In the three years since Equifax suffered a massive data breach, the consumer credit reporting firm says it has worked tirelessly to overhaul the security shortcomings that allowed the breach to happen. Equifax CISO Jamil Farshchi and other security experts weigh in on important lessons learned.
This whitepaper maps out a practical path to using Fortanix technology alongside your existing hardware security modules to improve on-premises, public cloud, and hybrid cloud data security. “Rip and replace” is expensive and disruptive. Instead, consider a methodical approach to the future that implements a...
Shocking but true: 44 percent of East-West traffic is not encrypted. If you ever needed a reason to evaluate your own network, our new TLS research report is jammed with more numbers that will motivate you to do so. Researchers studied 275 billion data flows to reveal real-world metrics of SSL/TLS protocol usage, and...
Data has a definite lifecycle. Understanding that lifecycle and looking at data through the lens of that life cycle creates new ways of looking and thinking about data and create a language to understand and see new opportunities for the data the organization holds and also perhaps opportunities to dispose of data...
Australian shipping giant Toll Group recently suffered its second ransomware outbreak of the year, with Thomas Knudsen, the company's managing director, branding the latest attack as being "serious and regrettable." But was it preventable?
If an organization fails to stop a ransomware attack, how does it recover the data? Backups, of course, are essential. But Peter Marelas of Dell Technologies says organizations should have a well-developed strategy for backups because attackers are increasingly targeting those systems as well.
Supermarket giant Morrisons is not liable for a data breach caused by a rogue employee, Britain's Supreme Court has ruled, bringing to a close the long-running case - the first in the country to have been filed by data breach victims.
Across the globe, the abrupt transition to remote work has accelerated digital transformation at an unprecedented pace. As workloads shift to the cloud, moving away from hardware-bound infrastructure, major security gaps have been exposed. Methods that may have worked in the past: locking down endpoints, monitoring...
It is a lot for IT teams to handle a remote workforce. Keeping up with security issues, maintaining data compliance, and minimizing data loss are some of the challenges IT teams are facing today.
In this webinar, we will cover how IT and security teams can empower end-users working remotely by increasing their...
Across the globe, the abrupt transition to remote work has accelerated digital transformation at an unprecedented pace. As workloads shift to the cloud, moving away from hardware-bound infrastructure, major security gaps have been exposed. Methods that may have worked in the past: locking down endpoints, monitoring...
The Forrester Wave��: Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.
Download the report to learn why Forrester...
As a result of the COVID-19 outbreak, cybercriminals increasingly are targeting organizations that now have more remote workers and fewer IT and security staff at the ready to mitigate hacker attacks and intrusions, security experts say.
According to Ricardo Villadiego, Lumu Technologies' Founder and CEO, organizations are "sitting on a gold mine: their own data". Under the single premise that organizations should assume they are compromised and prove otherwise, Lumu seeks to empower enterprises to answer the most basic question: Is your organization...
Unstructured data stores - text documents, excel spreadsheets, emails, pdfs and more - store untold volumes of personal and customer data. And as privacy and data protection regulations like the GDPR, CCPA, and NYDFS come into the spotlight, it's more important than ever to implement a privacy-centric approach to data...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.