OPINIONS

Tips for organizations in the wake of the biggest corporate hack in history

Tips for organizations in the wake of the biggest corporate hack in history

Consider the main learning points from this event and count yourself lucky that you can learn at Sony Picture Entertainment's massive expense.

How organizations can prepare for 2015 data privacy legislation

How organizations can prepare for 2015 data privacy legislation

Many states have laws today that require corporations and government agencies to notify consumers in the event of a breach - but it is not enough.

Don't dismiss internal data breaches as minor - they aren't!

Don't dismiss internal data breaches as minor - they aren't!

The wolf isn't at your door, it's inside. Ignorance is definitely not bliss. Just ask any of the regulatory agencies.

Could the Sony breach have been prevented?

Could the Sony breach have been prevented?

While most agree that corporate security needs to improve, a question still remains: Even with best practices in place, could the Sony debacle have been prevented?

Who is responsible for software safety? Nobody is no longer an option

Who is responsible for software safety? Nobody is no longer an option

It is now up to banks to self-regulate themselves or continue to deal with the pressing questions of concerned officials like Benjamin Lawsky.

Building a proactive versus solutions-based security plan

Building a proactive versus solutions-based security plan

2014 taught us that organizations cannot rest on their laurels. Security team needs to be in a state of hypervigilance. This is precisely why developing and implementing a proactive security plan will be a critical component of 2015 IT priorities.

The problem with Big Data

The problem with Big Data

Big Data just keeps on getting bigger and bigger. It's almost like Moore's Law. And...it has a domino effect.

The 10 POS malware families this holiday season

The 10 POS malware families this holiday season

This holiday shopping season, many retailers have two goals in mind - make record-breaking sales and don't get breached.

Securing the enterprise with the five W's of access

Securing the enterprise with the five W's of access

Burden of proof should grow heavier as request for access grows more sensitive.

Why compliance matters

Why compliance matters

Part of my role requires me to ask questions that an auditor might. This is especially true when it comes to compliance, why it matters, and how it makes a difference.

Sign up to our newsletters

TOP COMMENTS