A New Privacy Frontier: Protect Your Organization’s Gold With These 5 Data Risk Management Tips

The enactment of recent privacy mandates is just the start. A comprehensive data risk management program established before more regulations go into effect is well worth its weight in gold.

The post A New Privacy Frontier: Protect Your Organization’s Gold With These 5 Data Risk Management Tips appeared first on Security Intelligence.

Continue reading A New Privacy Frontier: Protect Your Organization’s Gold With These 5 Data Risk Management Tips

5 Recommendations to Improve Retail Cybersecurity This Holiday Season

With extra web traffic and high order volumes coming in, the holiday shopping season can be a particularly perilous time for retail cybersecurity.

The post 5 Recommendations to Improve Retail Cybersecurity This Holiday Season appeared first on Security Intelligence.

Continue reading 5 Recommendations to Improve Retail Cybersecurity This Holiday Season

Why the EU Is More Likely to Drive IT and Security Trends Than the US

EU companies are far ahead of their U.S. counterparts in terms of adopting IT and security trends, according to recent research.

The post Why the EU Is More Likely to Drive IT and Security Trends Than the US appeared first on Security Intelligence.

Continue reading Why the EU Is More Likely to Drive IT and Security Trends Than the US

How to Secure Mobile Messaging in Your Enterprise

Two decades ago, AOL’s Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever — but not much more secure.

The post How to Secure Mobile Messaging in Your Enterprise appeared first on Security Intelligence.

Continue reading How to Secure Mobile Messaging in Your Enterprise

As IoT Security Concerns Rise, Are Solutions Keeping Up?

This year, IoT security jumped in importance for many security professionals as enterprises continue to adopt more IoT technologies. Now, our security tools and solutions need to catch up.

The post As IoT Security Concerns Rise, Are Solutions Keeping Up? appeared first on Security Intelligence.

Continue reading As IoT Security Concerns Rise, Are Solutions Keeping Up?

Understanding California’s Consumer Privacy Act: The ‘American GDPR’

Most companies still are not fully up to speed on GDPR compliance. Starting in 2020, they’ll have a whole new regulatory maze to navigate: California’s Consumer Privacy Act.

The post Understanding California’s Consumer Privacy Act: The ‘American GDPR’ appeared first on Security Intelligence.

Continue reading Understanding California’s Consumer Privacy Act: The ‘American GDPR’

It’s Time for Cryptocurrency Security to Catch Up With Investor Expansion

Regulators and digital coin exchanges should build robust cryptocurrency security into their systems to protect themselves and individual investors from theft and fraud.

The post It’s Time for Cryptocurrency Security to Catch Up With Investor Expansion appeared first on Security Intelligence.

Continue reading It’s Time for Cryptocurrency Security to Catch Up With Investor Expansion

Global Perspectives on Cyber Resilience From Marsh & McLennan’s 2018 Cyber Handbook

Given the increasingly sophisticated and interconnected nature of the cyberthreat landscape, organizations must collaborate across sectors to improve cyber resilience around the world.

The post Global Perspectives on Cyber Resilience From Marsh & McLennan’s 2018 Cyber Handbook appeared first on Security Intelligence.

Continue reading Global Perspectives on Cyber Resilience From Marsh & McLennan’s 2018 Cyber Handbook

How Will You Solve the Data Classification Conundrum?

Data classification takes on even greater importance today in the context of regulatory compliance mandates and debates over data privacy. Here’s what you need to know.

The post How Will You Solve the Data Classification Conundrum? appeared first on Security Intelligence.

Continue reading How Will You Solve the Data Classification Conundrum?

How to Manage App Security Amid Expanding Shadow IT

Protecting endpoint-generated data is the name of the game in cybersecurity today. However, increasing shares of shadow IT devices in the workplace are making app security a more significant challenge.

The post How to Manage App Security Amid Expanding Shadow IT appeared first on Security Intelligence.

Continue reading How to Manage App Security Amid Expanding Shadow IT