You searched for breach/ | SC Media

Your search for breach/ returned 11 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Editorial remove
Security News remove

Your search for breach/ returned 11 results

Sort Results:

Relevant Recent
Illena Armstrong, VP, editorial, SC Magazine
Features

Finding a cure for breach fatigue

There probably always will be some indifference to breach notifications, but I'd like to hope that today's average, technology-reliant consumer isn't blissfully trusting that businesses and the government have their best interests in mind.
Illena Armstrong, VP, editorial, SC Magazine
Features

Data Breach Survey: Getting the bosses on board

One of the findings in SC Magazine's fourth annual "Guarding Against a Data Breach" survey is that you can get compliant with a sound security program in place, but you might not necessarily get security with a compliance-based plan.
Security News

Preventing multiple PII disorder

I used to think I was the one and only Illena Armstrong. The sobering truth, though, is that there are likely quite a few more of me around nowadays — or, at least, there very well could be soon enough.
Features

Making the right moves for advancement

In one of our features this month, "2006: Year of exposed IDs," we discuss the various breaches that have plagued businesses of all sizes over the last year. As our edition went to press, still other incidents cropped up.
Security News

IT security pros get well-deserved credit

Harrison Ford rocked as the brainy, swashbuckling Indiana Jones. His swaggering Han Solo will be remembered for years to come. But it seems these unforgettable roles have been hard to duplicate.
Security News

Measure your work to prove your value

IT security professionals whine too much. Their initial complaints often center on small or non-existent budgets. Then they focus on how colleagues, bosses and board members frequently overlook or simply shun the efforts they take to protect company assets. This is what a long-time IT security pro thinks, who said during a recent conversation that…
Next post in Features