The experts we spoke to for this new ebook agree that when deciding what data must be encrypted, it's a question of classifying it by level of importance.
The consensus from our panel of experts is that PCI DSS should be just one item on a far broader effort to integrate data security into enterprise risk management.
Cyber criminals have taken a particular liking to these platforms, given the amount of users who flock there to interact. Plus, sites like Twitter and Facebook form a vast repository for personal or proprietary data, making accidental disclosure or intentional targeting a real concern.
As such, business executives must discern just how to marry business-related social media use with all of the risks that it embodies, and then decide if social networking is friend or foe.
For a closer look at these articles, click here to visit our news section.
This week's news centers around our coverage of Black Hat in Las Vegas. In one session, a researcher detailed how ...
Black Hat 2014 once again brought in some of the brightest minds in the information security field to showcase their ...
This year's conference hits on various timely issues, including smartcards, the National Security Agency (NSA) and incident response plans.
This week, the Electronic Frontier Foundation (EFF) requested that a court find the National Security Agency (NSA) in violation of ...
A university rolled out a wireless network, but was hampered with a user-support problem...until a solution was found. Greg Masters reports.
A website attack prompted an Australia-based mining company to shore up its security implementation, reports Greg Masters.
With the addition of 15,000 mobile devices accessing its network, a medical center found assurance - and met compliance mandates, reports Greg Masters.
Chris Soghoian, who was recently hired as the ACLU's first-ever principal technologist, has never been afraid to ruffle the feathers of the corporate establishment when it comes to privacy and security issues.
Valerie Aurora and Mary Gardiner have united to form a decade-long collaboration on a variety of "women in open source" advocacy projects, including developing anti-harassment policies at conferences.