While the impacts of recent cyberattacks, high-profile data leaks, and compromised personally identifiable information (PII) are still being understood, credit card data breaches continue to plague enterprises. Unfortunately, 2014 was a watershed year for credit card theft as hundreds of millions of cards were stolen in a variety of attacks against organizations that took (or processed) payments from their customers. For many enterprises, these breaches occurred despite the fact these organizations took steps to protect this crucial data.Read more »
Sight is one of the five human senses that is too easily taken for granted. Sure, we use it to great advantage by processing spatial relationships around us and seeing the faces of friends and loved ones. But why is it that so many of us can admit to squandering the gift of sight – as we stare at our jumbo television screens watching “reality” TV shows?Read more »
For security professionals, having the latest news, information, and training is a critical part of our daily jobs. Thanks to the folks at SANS Institute, getting timely, consistent, and qualified knowledge on security topics has never been easier.Read more »
In a previous blog, I elicited crowd-sourced feedback on the approaches being used to secure the insides of enterprise data centers and public cloud deployments. First, let me thank everyone who spoke to us or emailed their feedback. We also gathered feedback and insights from security leaders and IT practitioners who visited our booth at last month’s RSA Conference.Read more »
If you ever brought in a piece of chewing gum back in elementary school, teachers were quick to instill a sense of fair play with your peers by saying something along the lines of, “did you bring enough for the rest of the class?” I don’t know about your experiences, but I never saw a kid actually have enough to share with an entire class! As that one lucky student enjoyed his/her treat, the rest of the students sat and suffered in agony, devoid of the experience.
Fortunately, unlike a snack or a piece of gum, when it comes to sharing thoughts and ideas about enterprise security—there’s usually plenty to go around. This can be beneficial, providing security practitioners a platform to share information in their common pursuit of security.Read more »