dcsimg

Governance And Risk - Article Archives - Page 1

Video Roundtable: Smart Tech and Security High Priorities for Execs

September 24, 2015 |

A panel of tech journalists will discuss "smart" technologies and security among other topics during a video roundtable focusing on new QuinStreet Enterprise research.

READ MORE

End Users Closer to Embracing Change, Giving Up Passwords

July 15, 2015 |

The results of a new survey by Accenture may carry good news for both end users and providers working to maximize their data security and minimize their reliance on passwords.

READ MORE

Authentication Options: What Users Want Matters

June 15, 2015 |

Collecting information directly from financial services consumers, Telstra illustrated how delicate the balance is between providing what consumers say they want and what they will accept.

READ MORE

Data Breach Cost Study Finds Steep Increases

June 05, 2015 |

Almost all aspects of data breach mitigation and remediation are rising in cost. Ponemon Institute identifies several significant factors that reduce those costs, as well.

READ MORE

Keeping Security Monitoring In-House Becoming Riskier for Some Businesses

May 19, 2015 |

It has become a question of balance and value, with IT organizations being asked to set up and monitor millions of alerts and identify the most important ones in an instant.

READ MORE

Security Trends and Best Practices Hangout

May 06, 2015 |

May 7, join us in a Google Hangout conversation. QuinStreet editors will discuss security research and how cybersecurity is changing the business.

READ MORE

Ignore Solution to Phishing, Spearphishing Risk at Your Peril

April 16, 2015 |

Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.

READ MORE

Nation-State Attackers Require a Different Response

April 09, 2015 |

In the same way that the attackers took their time entering a system, the affected company can take its time isolating and studying the malware, rather than immediately sounding an alert.

READ MORE

Why the Data Security and Breach Notification Act Is Drawing Ire

March 24, 2015 |

We may never see a completed national data protection and breach notification law, if questions about language, coverage and interference with state protections aren't adequately answered.

READ MORE

Cybersecurity Project Targets Better Patient Health

March 17, 2015 |

Better outcomes for patients is the added level of urgency in cybersecurity efforts for health care organizations.

READ MORE

A Positive Spin on Security as Business Enabler

March 10, 2015 |

A message on the full range of benefits of security tools and approaches can help bring executives and the board closer together on strategic planning.

READ MORE

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS

Encryption Not a Black and White Approach

February 13, 2015 |

Organizations are being led to believe that encryption is an either-or choice, but that is not the case.

READ MORE

Cybersecurity Insurance, IT Processes Melding into New Approach

February 11, 2015 |

Awareness of the breadth and depth of damages from data breaches is boosting demand for increasingly sophisticated cybersecurity insurance products, says MetricStream's Yo Delmar.

READ MORE

Heartland Protects Merchant Customers with Breach Warranty

January 12, 2015 |

Small businesses may start to see more warranty products offered like Heartland's Heartland Secure.

READ MORE

Intel Takes on Password Responsibility, Acquires PasswordBox

December 01, 2014 |

Intel doubles down on password-based security with today's acquisition, despite severe vulnerabilities in the approach.

READ MORE

Pew: Experts Expect Significant Cyberattack by 2025

October 29, 2014 |

The Pew Research Internet Project collected predictions and thoughts about coming cyberattacks from over 1,600 experts. They are not optimistic.

READ MORE

Chamber of Commerce Set to Hold October 28 Cybersecurity Summit

October 21, 2014 |

Heavy hitters from federal agencies, the executive and legislative branches and private enterprise will spend the day discussing the NIST Cybersecurity Framework and other actions.

READ MORE

Who Will Be Held Responsible for Personal Info Breaches

October 01, 2014 |

What happens with customers in the aftermath of a breach can often be hard to discern, so surveys like this one help companies predict behavior.

READ MORE

More than a Name Change: ISIS Mobile Wallet Becomes Softcard

September 17, 2014 |

Even if users aren’t turned off by security and privacy worries, they don’t see the benefit of switching from using credit cards to using their phones to make payments.

READ MORE

Internet Slowdown Protest Planned to Support Net Neutrality

September 04, 2014 |

On September 10, organizers hope that as many websites as possible will participate in the protest by displaying a symbolic “site loading” icon on their home pages.

READ MORE

NewsletterITBUSINESSEDGE DAILY NEWSLETTER

SUBSCRIBE TO OUR DAILY EDGE NEWSLETTERS