As the online frontier continues to pose unique challenges for merchants tasked with protecting sensitive data supplied by their customers, the PCI Security Standards Council has released a set of supplementary guidelines covering ecommerce activity.
The impetus for this report was primarily commun...
Not long ago, data security was a relatively predictable IT responsibility left in the hands of mid-level associates and administrators. Now that threats are coming in greater volume and variety, however, a number of CIOs are having to fundamentally rethink their protection of sensitive information ...
The simultaneous rise of consumerized IT, mobile devices and cloud computing has ensured that sensitive corporate information is now reaching more people and more endpoints than ever before. As much as they would like to, risk management professionals cannot turn back the clock on this increasingly ...
Data breach scenarios are the stuff of nightmares among IT security professionals, but logic tells them that it may only be a matter of time before their organizations fall victim to an external attack or internal mistake. When disaster strikes, the degree of damage is often dependent on how teams h...
News headlines may make it sound like there's always an organized cybercriminal syndicate waiting to break down the firewall and steal everything in the corporate network. Flashy headlines and referencing scary hacktivist groups may be good for the media, but those strategies also take attention awa...