How CISOs Can Tell A Better Security Story To Their Board

Reading Time: 4 minutes Historically, when CISOs have been called to speak to their organization’s board of directors, it was an uncommon event. Just a decade ago, the CISO who presented more than once per year was a rare bird. Times have changed…. Read More

More PHI Breaches Caused By Providers, Insiders, Report Says

Reading Time: 3 minutes More Protected Health Information (PHI) is leaked by healthcare providers, not hackers, academic research by Michigan State University and Johns Hopkins University released Monday says. Researchers say that when it comes to data breaches, more than half of the… Read More

Deploy Multiple Defence Layers To Protect Data-Rich Applications

Reading Time: 3 minutes What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? The first step any organisation needs to take to protect itself against an application layer attack is… Read More

In Terms Of Main Threat Actors, Expectation Rarely Matches Reality

Reading Time: 2 minutes Netwrix conducted a study of the major IT risks that are significant for most organizations and assessed respondents’ readiness to withstand cyber threats. The report is based on the feedback of 1,558 organizations of various sizes from many different… Read More

Data Breach Reports See 75% Increase In Last Two Years

Reading Time: 3 minutes Data breaches are up 75% in two years, finds a report from the Information Commissioner (ICO). The study, carried out by Kroll, took into account an array of personal data, including health, financial and employment details. Access to this… Read More