Posted on 10 September 2015 by Danna Bethlehem
The breach of the IRS affected 334,000 taxpayers, whose personal information including Social Security numbers and home addresses, were compromised. Learn the key lessons from this attack.
Posted on 07 October 2015 by Jennifer Dean
While Bring Your Own Device continues to grow at a prolific rate, IT teams face the challenge of securing and enabling access to the enterprise ecosystem via a wide range of devices from different manufacturers. So how does corporate IT deal with the BYOD phenomenon while ensuring the security of corporate networks and data?
Posted on 29 October 2015 by Thales DIS
The domino effect of technology has always fascinated me – especially when it comes to what prompts the evolution of cyber security solutions and how quick enterprises embrace security best practices. For example, it’s not news that the increasing capabilities of mobile devices and the networks supporting them means employees are able to get more […]
Posted on 11 November 2015 by Thales DIS
After a list of Comcast email accounts were offered for sale in an underground store, consisting of customers’ Comcast email addresses and associated passwords, Comcast—one of the largest providers of cable, internet and phone services in the US—forced a password reset on those accounts. Of the 600,000 accounts offered for sale, 200,000 were found by […]
Posted on 02 December 2015 by Thales DIS
This year’s Gartner Identity and Access Management Summit, held in Las Vegas, NV from December 7 -9, will deliver strategic insights for IAM in the digital age, as well as the latest tactics in IAM architecture.
Posted on 03 December 2015 by Thales DIS
As 2015 comes to a close, and IT, security and compliance leaders draw on the developments of the past year to plan for a more digitally secure 2016, here are some takeaways to keep top of mind when sketching plans on the whiteboard or reviewing financial statements. The Cost of a Data Breach The IBM […]