In the wake of eBay's recent data breach, many consumers and security professionals have been extremely vocal in their protest of the company's response to the situation; some are calling it one of the worst corporate crisis responses they've ever seen. eBay's stock price in the days after the breach took a major hit, dipping to the lowest since December 2013. When considering the costs of a data breach, damage to company systems, loss of intellectual property, remediation and forensic costs are usually what come to mind. Some organizations also factor in the cost associated with reputation damage, which may harm revenue, as well as industry fines or possible prosecution. Thycotic, a provider of privileged account management solutions for global organizations, has compiled the following list of best practices for mitigating data breaches and avoiding the costly headaches associated with them.
Thycotic Software deploys smart, reliable, IT security solutions that empower companies to control and monitor privileged account credentials and identity access for administrators and end users. An Inc. 5000 company, Thycotic is recognized as the fastest growing privileged management vendor in IT security and one of the top 30 fastest growing companies headquartered in Washington, D.C.
Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ... More >>
Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ... More >>
Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ... More >>