Playing It Smart for Data Controllers and Processors

Organizations preparing for GDPR should reach out to their third-party vendors to clearly define the roles, expectations and responsibilities of data controllers and processors.

The post Playing It Smart for Data Controllers and Processors appeared first on Security Intelligence.

Continue reading Playing It Smart for Data Controllers and Processors

Six Major Data Breach Trends From 2017

The IBM X-Force team monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents and protect sensitive data.

The post Six Major Data Breach Trends From 2017 appeared first on Security Intelligence.

Continue reading Six Major Data Breach Trends From 2017

‘Tis the Season for Retail Disruption

Companies looking to minimize retail disruption during this holiday season should keep close tabs on emerging trends such as ransomware, the IoT and more.

The post ‘Tis the Season for Retail Disruption appeared first on Security Intelligence.

Continue reading ‘Tis the Season for Retail Disruption

Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption

Fail-safe measures such as encryption can help organizations minimize cloud and third-party risks in the virtually inevitable event of a data breach.

The post Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption appeared first on Security Intelligence.

Continue reading Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption

Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges

Security leaders in the health care, financial services, and energy and utilities sectors must pay special attention to industry-specific security risks.

The post Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges appeared first on Security Intelligence.

Continue reading Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges

From the Starship Enterprise to Your Enterprise: Eight Cybersecurity Lessons From ‘Star Trek’

To prepare for the upcoming “Star Trek: Discovery” series, here are eight cybersecurity lessons companies can learn from the science fiction franchise.

The post From the Starship Enterprise to Your Enterprise: Eight Cybersecurity Lessons From ‘Star Trek’ appeared first on Security Intelligence.

Continue reading From the Starship Enterprise to Your Enterprise: Eight Cybersecurity Lessons From ‘Star Trek’

The Cloud Security Risks Hidden in Plain Sight

Organizations must pay closer attention to cloud security risks, such as third-party access and human error, that are hiding in plain sight.

The post The Cloud Security Risks Hidden in Plain Sight appeared first on Security Intelligence.

Continue reading The Cloud Security Risks Hidden in Plain Sight

The Educator’s Back-to-School Cybersecurity Checklist: Make Mitigating Command Injection a Priority

To protect students, parents and teachers from data theft, academic institutions must adopt comprehensive strategies to mitigate command injection attacks.

The post The Educator’s Back-to-School Cybersecurity Checklist: Make Mitigating Command Injection a Priority appeared first on Security Intelligence.

Continue reading The Educator’s Back-to-School Cybersecurity Checklist: Make Mitigating Command Injection a Priority

Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program

Security professionals need a layered, end-to-end life cycle approach to managing the security risks associated with enterprise cloud computing.

The post Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program appeared first on Security Intelligence.

Continue reading Shrink Your Enterprise Cloud Computing Security Concerns With a Cloud Vendor Risk Management Program

Leading by Example: Security and Privacy in the Education Sector

Today’s students must grapple with security and privacy issues, such as identity theft and financial fraud, that could affect them well past graduation.

The post Leading by Example: Security and Privacy in the Education Sector appeared first on Security Intelligence.

Continue reading Leading by Example: Security and Privacy in the Education Sector