In the wake of data breaches, cyber espionage and cybercrime, organizations in 2015 gave security a higher profile than ever before. Credit: Thinkstock Following years of high-profile data breaches, along with cyber espionage and cybercrime, organizations in 2015 started giving security a higher profile than ever before. Here are the 10 most popular security stories of the year. 10. Microsoft CEO takes a collaborative approach to cybersecurity, by Kenneth Corbin Microsoft CEO Nadella talks of company’s role in an ‘ecosystem,’ saying partnerships and top-to-bottom protection and detection critical to battle emerging security threats. 9. Closing the cybersecurity talent gap, one woman at a time, by Sharon Florentine The severe shortage of cybersecurity talent is leaving the U.S. vulnerable to attacks. Women, in particular, are key to closing the security skills gap. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe 8. What the Anthem data breach says about the vulnerability of healthcare IT, by Paddy Padmanabhan The Anthem data breach, along with other highly publicized cases like Sony and Target, tell us that corporate information systems are fighting a losing battle against hackers. Large health systems are most vulnerable due to their outdated IT infrastructure. 7. Cloud security: 6 steps for keeping your data safe, by Paul Gillin Cloud service providers have little choice but to deliver world-class security. Without it they can’t compete for lucrative business from big customers in industries like financial services and healthcare. 6. 4 new cybercrime trends threaten your business, by Jen A. Miller A mid-year report shows that people aren’t necessarily getting smarter about security, even in the face of increased attacks from cybercriminals. 5. Is BYOK the key to secure cloud computing?, by Mary Branscombe Amazon, Adobe and Microsoft offer it but how realistic is it to “bring your own keys?” Do you want your business to have the burden of managing and securing your own cloud encryption keys? 4. 7 steps to protect your business from cybercrime, by Paul Mah As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattacks. 3. How OPM data breach could have been prevented, by Kenneth Corbin The director of the U.S. government’s Office of Personnel Management is out after revelations that the recently disclosed data breach was far larger than initially thought. Inspector general says warnings went ignored. 2. 5 tips to keep your data secure on the cloud, by Victoria Ivey How can you be sure the information you store on the cloud is safe? The short answer is you can’t. However, you can take some protective measures. Here are five data privacy protection tips to help you tackle the issue of cloud privacy. 1. 6 biggest business security risks and how you can fight back, by Jennifer Lonoff Schiff IT and security experts discuss the leading causes of security breaches and what your organization can do to reduce them. Follow Thor on Google+ Related content feature Mastercard preps for the post-quantum cybersecurity threat A cryptographically relevant quantum computer will put everyday online transactions at risk. Mastercard is preparing for such an eventuality — today. By Poornima Apte Sep 22, 2023 6 mins CIO 100 Quantum Computing Data and Information Security feature 9 famous analytics and AI disasters Insights from data and machine learning algorithms can be invaluable, but mistakes can cost you reputation, revenue, or even lives. These high-profile analytics and AI blunders illustrate what can go wrong. By Thor Olavsrud Sep 22, 2023 13 mins Technology Industry Generative AI Machine Learning feature Top 15 data management platforms available today Data management platforms (DMPs) help organizations collect and manage data from a wide array of sources — and are becoming increasingly important for customer-centric sales and marketing campaigns. By Peter Wayner Sep 22, 2023 10 mins Marketing Software Data Management opinion Four questions for a casino InfoSec director By Beth Kormanik Sep 21, 2023 3 mins Media and Entertainment Industry Events Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe