For organizations that suffer a data breach, the penalty typically involves a clean up and making good on the damage to their reputation. But is that enough to encourage better security controls? Karen Epper Hoffman finds out.
How can we overcome data breach fatigue and restore trust in business and government's ability to protect personal data? Lee Sustar reports.
The first step to prevent the next big breach is to include application developers in decision-making talks, says OWASP's Matt Konda.
There's nothing like a breach - or two - to galvanize the federal government to contain risk and strengthen its cybersecurity posture. DHS's Gregory Touhill says his agency is on the case. Ashley Carman reports.
Chief security officers are trying to implement better IT security in the face of increasing breaches - and often doing it on a tight budget, reports Karen Epper Hoffman.
Information sharing is vital, and it always will be, says Stephen Orfei, general manager at PCI SSC.
Threat actors have free rein while business and government players remain relatively uncoordinated in their responses, reports Alan Earls.
Insurance to cover loss after a data breach is becoming mainstream, but buyers must investigate the options, reports Jesse Staniforth.
The Internet of Things offers convenience, but getting the security right is key, says John Johnson, global security architect at John Deere. Teri Robinson reports.
Even before an organization is breached, these processes should be put in place to limit damage, bolster technical defenses and help repair the brand, reports Larry Jaffee.