Data breaches are reported all the time in the news - and often when a breach occurs, fingers are pointed at everyone from hackers, to CSOs, IT and even end users. So in looking at a typical breach, Jackson Shaw, senior director of product management at Quest Software, wanted to break down why the fingers get pointed at these particular people (aside from the hacker, as that’s generally an obvious target) and why they should each care about data governance. For simplicity, he’s going to break this down into three groups: The end user, the IT department, and the line of business manager, and he’ll use the case of financial data.
While most of the emphasis on protecting networks today is focused on protecting data within the enterprise or data center, the physical infrastructures of both public and private Internet networks are vulnerable to calculated attacks. ... More >>
Spring signals a time for many to press pause on hectic schedules and enjoy a week of vacation, but basic cybersecurity processes and procedures still need to remain priorities. ... More >>
Advanced security hacking techniques known as ransomware attacks are on the rise, so it’s important that organizations be proactive in protecting against such attacks. ... More >>