Overheard at RSAC 2019

As I write this, I’m waiting for the final keynote of RSAC 2019 to begin—a conversation with actress Tina Fey. I’m not sure what she will be talking about in relation to security, but it is a great way to end what has been a very busy conference. One … Continue reading Overheard at RSAC 2019

Will the NIST Privacy Framework Change How We Approach Privacy?

The NIST Cybersecurity Framework changed the way we think about security. Will NIST’s Privacy Framework have the same effect? Happy fifth anniversary to the NIST Cybersecurity Framework. When it was issued in February 2014, the goal of the Cyber… Continue reading Will the NIST Privacy Framework Change How We Approach Privacy?

With CCPA Approaching, Is True Data Deletion Possible?

For consumers, the proliferation of data privacy laws means control over their sensitive information once they share it with a company (or at least the appearance of control). For organizations, data privacy laws can be a logistical nightmare. How do … Continue reading With CCPA Approaching, Is True Data Deletion Possible?

Trust Nothing if You Want Real Security

As I looked over the schedule for Check Point’s CPX 360 conference, one keynote session jumped out at me, not because of the topic but because of the name of the presenter: Freaky Clown, in all caps. “You’ll want to go to that one,” someone from Check… Continue reading Trust Nothing if You Want Real Security

Organizations Continue to Fail at IoT Security, and the Consequences Are Growing

As the internet of things (IoT) takes over the world, IoT security remains, well, pitiful. Organizations are failing to ensure that the networks and data generated by IoT devices remain protected.

The post Organizations Continue to Fail at IoT Security, and the Consequences Are Growing appeared first on Security Intelligence.

Continue reading Organizations Continue to Fail at IoT Security, and the Consequences Are Growing

The Cyber-Risk Paradox: Benefits of New Technologies Bring Hidden Security Risks

When attending cybersecurity conferences, you expect to learn a lot of interesting things surrounding data security, but my experience is that there is always one tidbit, one piece of information, that jumps out at you and makes you think. At this yea… Continue reading The Cyber-Risk Paradox: Benefits of New Technologies Bring Hidden Security Risks

Developing a Security Plan Around Consumer Data Privacy Concerns

The onus to meet the challenge of consumers’ security and privacy expectations is on the enterprise. Developing a security plan around consumer concerns is a good first step.

The post Developing a Security Plan Around Consumer Data Privacy Concerns appeared first on Security Intelligence.

Continue reading Developing a Security Plan Around Consumer Data Privacy Concerns

Cyber Insurance Adoption Low, Despite Rising Cyberattack Threats

Cyber incidents are costly. We know that. Just how costly has been a subject of debate, but a new study from Cyber Risk Management (CyRiM) project, a Singapore-based public-private initiative that assesses cyber-risks, gives some eye-popping figures. … Continue reading Cyber Insurance Adoption Low, Despite Rising Cyberattack Threats

National Privacy Day: Time to Consider a National Data Privacy Law

Happy Data Privacy Day. This “holiday,” observed Jan. 28, is marking its fifth year, but this year organizations and individuals may be a little more tuned in to the importance of data privacy than in years past. As David Ginsburg, vice president of M… Continue reading National Privacy Day: Time to Consider a National Data Privacy Law

As BYOD Adoption and Mobile Threats Increase, Can Enterprise Data Security Keep Up?

While most security professionals have come to embrace bring-your-own-device (BYOD) policies, leadership still often lacks confidence in the data security of employees’ personal devices.

The post As BYOD Adoption and Mobile Threats Increase, Can Enterprise Data Security Keep Up? appeared first on Security Intelligence.

Continue reading As BYOD Adoption and Mobile Threats Increase, Can Enterprise Data Security Keep Up?