2014 Data Breaches by the Numbers (and the Impact)
Posted on 12 February 2015 by
Time changes everything. Unfortunately, in terms of breach occurrences, things didn’t improve in 2014.
Posted on 12 February 2015 by
Time changes everything. Unfortunately, in terms of breach occurrences, things didn’t improve in 2014.
Posted on 20 January 2015 by
Pairing companies and simulating a Vegas-type point spread provides a great model for highlighting the winners vs. losers when it comes to securing data.
Posted on 04 August 2014 by
Learn the best way to control access and the authentication of users in the sixth and final part of our Securing the Breach blog series.
Posted on 22 July 2014 by
To ensure security, organizations must establish a centralized policy around the protection, storage, back-up and organization of encryption keys.
Posted on 19 May 2014 by
In the fourth part in our Securing the Breach series, we explore why high speed encryption is crucial for protecting sensitive data in motion.
Posted on 16 April 2014 by
In the third installment of Securing the Breach, we take a closer look at the types of data that need encryption, and specifically “data at rest.”