The "Great Resignation" over the past year has created a host of concerns around both malicious and accidental data theft, says Code42 President and CEO Joe Payne. Even though employees often aren't looking to wreak havoc on their way out, a lack of understanding can lead to serious headaches.
As organizations move to the cloud, adapt to remote work, and cope with the Great Resignation, tracking data sprawl and identifying risk across the enterprise becomes an impossible task.
Collaborative apps, data democratization, and corporate/personal use apps means data is constantly spreading and often...
Historically, corporations have used digital forensic investigation tools for legal requests, discrimination and harassment investigations, IP theft investigations, compliance, M&A and other HR investigations. However, despite what is reported in the news about cyber incidents and cyberattacks, many are perpetrated by...
Executives are required to make “data-driven” decisions; Metrics, Objectives & Key Results (OKRs), Key Performance Indicators (KPIs) – however you define being data-driven – to measure security program effectiveness, and frame their conversations to the board, partners, and company at large.
Yet, there...
While major hacking incidents regularly grab headlines, insider threats - including malicious individuals, careless workers and third-party contractors - continue to pose significant and sometimes underestimated risk to healthcare sector entities, federal authorities warn.
Each day organizations face new threats that jeopardize their critical networks. Gaining visibility into the security risks your supply chain or third-party vendors pose to your organization is a growing priority among cybersecurity leaders. Next-generation cybersecurity practices will require organizations to align...
Many enterprises are realizing that a CASB (Cloud Access Security Broker) is essential for securing their cloud apps and services. This whitepaper explores topics such as:
How CASB can help manage people-based risk, apps and data in the cloud ;
What are the top benefits of CASB & it's role across business...
With increased digitalisation, core users have access to systems and networks that host millions of records and critical business assets. Security leaders are racing to protect their business and manage a remote workforce.
Download this whitepaper to learn more:
The causes & catalysts of insider threats;
What...
With open channels of communication come hidden threats. Inside this eBook learn how communication and social media tools are changing the insider risk equation for compliance, IT and legal teams.
Download the eBook dive deep into 5 major areas of risk:
Trio-of-trouble -people-based data risks;
HR policy...
Access Health, Connecticut's health insurance exchange under the Affordable Care Act, experienced dozens of mostly small data breaches over about a 3 1/2-year period, and the vast majority involved one contractor, says an auditor report that recommends the exchange make improvements to data security.
The latest edition of the ISMG Security Report reviews the latest cyber resilience "call to action" from the White House and also explores authentication provider Okta's failure to inform hundreds of customers in a timely manner that their data could have been stolen by the Lapsus$ group.
Organizations must use every available resource to protect against the latest cyberattacks, the persistent nature of advanced threats, as well as the ease with which malware can cripple an entire network.
One of the most important — and often overlooked — resources that organizations can tap into to solve these...
The pandemic has raised the ante significantly for the attack surface and the level of insider threats facing healthcare sector entities, according to Dave Bailey, vice president of security services, and attorney Andrew Mahler, vice president of privacy and compliance, of consultancy CynergisTek.
Insider risk and data loss prevention (DLP) are a top concern for organisations today. And it makes sense, with a distributed workforce and increasing reliance on technology, legacy, on-prem DLP technology hasn’t lived up to its promises.
That’s because data loss begins with people, whether careless, compromised...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.