Data breaches are reported all the time in the news - and often when a breach occurs, fingers are pointed at everyone from hackers, to CSOs, IT and even end users. So in looking at a typical breach, Jackson Shaw, senior director of product management at Quest Software, wanted to break down why the fingers get pointed at these particular people (aside from the hacker, as that’s generally an obvious target) and why they should each care about data governance. For simplicity, he’s going to break this down into three groups: The end user, the IT department, and the line of business manager, and he’ll use the case of financial data.
Chances are that you or someone you know has had an account hacked. Here are steps you can take to help keep your accounts from being breached again. ... More >>
Unveiling new technologies designed to help reduce cyber threats and protect against devastating attacks that can cripple a company or wipe out a consumer’s bank account. ... More >>
Privileged passwords are created and used by trusted IT administrators to maintain servers, configure services, and install new software or devices. These accounts are a constant risk, both from external hackers and curious or disgruntled insiders. ... More >>