Data breaches are reported all the time in the news - and often when a breach occurs, fingers are pointed at everyone from hackers, to CSOs, IT and even end users. So in looking at a typical breach, Jackson Shaw, senior director of product management at Quest Software, wanted to break down why the fingers get pointed at these particular people (aside from the hacker, as that’s generally an obvious target) and why they should each care about data governance. For simplicity, he’s going to break this down into three groups: The end user, the IT department, and the line of business manager, and he’ll use the case of financial data.
When a next-generation security intelligence platform unifies the right tools, threats and risks are exposed like never before and enterprises have the ability to secure their networks and comply with regulatory requirements. ... More >>
Plenty of new technologies are being developed by companies in Silicon Valley and around the world right now. Here are 13 of the hottest. ... More >>
Here's a look at how Edward Snowden successfully breached the National Security Agency (NSA), using low-level system administrator credentials. ... More >>