If you think about what an election is, you can see that it’s largely about data quality. Millions of people create a few pieces of data each. All that data flows through a multi-layered system and ends up being part of a very critical dataset that drives very real world matters. Is there any place where the security and integrity of information is more important?
The CEO of Ashley Madison resigned as a result of the very public data breach the company suffered. This CEO follows the same IT security road of shame that the leadership of Target and other corporations have taken.
After incursions into Target, Home Depot, JP Morgan, Sony Pictures and others, I’ve been asked if it’s now reached the point where some information is simply too sensitive to entrust to computers. My response is that they’re not asking quite the right question. Instead, when it comes to data security, here are the four hard questions that should be asked.
These 10 privacy threats are explained in the form of stories of fictitious individuals.
While we’re now past the point of arguing the hype vs. reality of the cloud, security is one cloud-based topic where there are still plenty of skeptics. So it was no surprise – to us, at least – when our latest industry survey revealed that an overwhelming 86% of IT…
If there’s one thing we enjoy here at Identity Week, it’s conducting anonymous surveys to learn what’s really going on in IT shops around the world. Here’s what we found out from our latest one: 39% of IT admins claim that they can get unauthorized access to the most sensitive…
In business terms, disaster planning revolves around data backup and data recovery processes. The fact of the matter is that real business continuity cannot be maintained in this digital age without off-site backup. With this in mind, I have created a list of the biggest issues organizations face as they plan for continuity.
The lesson to be learned is that while free, publicly available consumer grade email may be easy to use and devoid of the expense of an IT department’s support, these services are simply not designed for secure communication.
This year we conducted a survey of more than 500 IT professionals and really wanted to see how easily accessible data really was. Our findings were rather eye-opening. As increased instances of phone hackings and other corporate data breaches occurred, the ever menacing insider threat is still very much real….
…based on my years of experience working with some very large and prominent enterprises, I’ve learned that there are some frequently overlooked security practices that organizations could begin implementing today in order to increase their security postures quickly.