According to the Verizon data breach investigations report released today, the average cost per breached data record is 58 cents. That's a far cry from other estimates that put the average per-record loss at around $200.
How far does stolen data get before a breach is detected? That's the question Bitglass asked -- and answered -- in a recent experiment. The Cambell, Calif.-based company went on the Dark Web and planted documents filled with mocked-up...
Could Detroit be the Next Technology Hub?
This month’s Fortune article asks the question: Is Detroit the next Silicon Valley? While on the surface these two areas seem quite different – one known for auto manufacturing and the
The need for cybersecurity protection is obvious and agreed upon by Congress, the President, and more. But how will newly introduced initiatives prove effective? Jonathan Feld and Suzanne Alton weigh in
Research shows a majority of enterprises leave DDoS protection to network-servicer providers, web-hosting services or internal resources. But these aren’t the only options for shielding your organization.
People who wouldn't think about selling their personal passwords to criminals for a few quick bucks are apparently not so concerned when it comes to their employers. A number of surveys, including one done recently, find that workers...
Two new malware campaigns have been spotted in the Middle East, according to reports released this week, one targeting energy companies and the other going after political targets in Israel and Lebanon.
Palo Alto Networks is introducing a service that tips customers off when it discovers unique or particularly dangerous attacks against their networks, giving them a heads up that perhaps they are the targets of particularly...
The number of distributed denial of service attacks using anonymous proxies has increased dramatically over the past year, according to a new research report, as attackers use these proxies to create an instant pseudo-botnet
As enterprises rush to empower employees with a new mobile workstyle, the context of data access is changing. To enable the highest level of productivity while keeping corporate data secure, you must understand the context. The