How an organization communicates in the wake of a major breach incident can play an important role in maintaining the organization's reputation and minimizing the financial impact.
But how can your organization avoid mismanaging post-breach communication and potentially wasting millions of dollars?
Join us for...
As the growth in mobile devices creates new opportunities for consumers and businesses alike, new threats are emerging. iovation's mobile fraud detection white paper will help you understand the evolving mobile landscape, the business and technical decisions that you may soon have to make regarding fraud risk and how...
Marcus Ranum isn't shy about saying online authentication methods are outdated and insecure. Passwords will get breached, but organizations can do more to protect their users and online databases.
LinkedIn's failure to comply with long standing industry standard encryption protocols jeopardized its users' PII, and diminished the value of the services, the class action federal lawsuit filed in northern California says.
A successful effort to build a corporate culture that values privacy should be built on ideas that come from the rank-and-file staff in all departments, says Jan Hillier, a specialist in managing change.
In healthcare, financial services and other sectors, information breaches are an epidemic. More than 400 major healthcare breaches have been reported since late 2009. And headline-grabbing breaches in the financial services sector, such as the Sony and Global Payments incidents, illustrate why preventing breaches -...
The online dating website eHarmony has warned a "small fraction" of its users of a June 6 breach that likely exposed hashed passwords. Whether the incident is related to a LinkedIn breach has not been confirmed.
The social network Myspace has settled with the Federal Trade Commission over misrepresenting its privacy policies by sharing personally identifiable information with advertisers without first getting permission from users.
Which security concerns should institutions be bracing for, as more consumers adopt mobile banking? BITS offers a collection of recommendations from some of the industry's top institutions.
Nearly three-quarters of surveyed professionals say concerns regarding data security prevent their organizations from adopting cloud services. And more than half of the respondents say their own services are more secure than those offered by cloud providers.
These are among the findings of the new 2012 Cloud...
Creating a "culture of compliance" that emphasizes the importance of privacy requires far more than "management by committee," says change management specialist Jan Hillier.
Creating a more trusted Internet ecosystem should help all types of enterprises and leaders implement identity management solutions that extend beyond usernames and passwords, White House Cybersecurity Coordinator Howard Schmidt says.
As enterprises spend frugally on IT security, cybercriminals aren't, and that presents big problems for organizations working feverishly to secure their digital assets, says Steve Durbin, global vice president of the Information Security Forum.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.