Data breaches are reported all the time in the news - and often when a breach occurs, fingers are pointed at everyone from hackers, to CSOs, IT and even end users. So in looking at a typical breach, Jackson Shaw, senior director of product management at Quest Software, wanted to break down why the fingers get pointed at these particular people (aside from the hacker, as that’s generally an obvious target) and why they should each care about data governance. For simplicity, he’s going to break this down into three groups: The end user, the IT department, and the line of business manager, and he’ll use the case of financial data.
While technology and personal habits mature with each new cyber attack, the threats lurking around the corner do the same at a seemingly uneven pace. ... More >>
While it's easy to think that one tool will solve your security burden, the reality is that cyber criminals are determined to get into your network, steal data or disrupt performance. ... More >>
By focusing security resources on detection and containment, with a strong emphasis on network visibility, enterprises can turn the tables on cyber criminals. ... More >>