Andrew Hay to moderate a panel at the RSA Conference

Do you know many Internet of Things devices are currently connected to your company’s network? More importantly, do you know if any of those devices contain vulnerabilities that could leave your sensitive data exposed to …

Defining Cybersecurity Expertise

While a proposed U.S. Senate bill that would require boards to disclose their cybersecurity expertise has plenty of flaws, the proposal sends a clear message that government leaders are concerned about how public companies protect …

5 analyst tips for becoming data-aware

Being an IT expert doesn’t mean always knowing the answer. Sometimes, it’s important to get a fresh perspective from an unbiased industry voice. In these situations, turning to your industry’s leading analysts can help offer …

Cloudy with a chance of data loss

Our friends over at Blue Coat Systems recently released the H2 2015 Shadow Data Report highlighting research conducted by the company’s Elastica Cloud Threat Labs team. Using data from 63 million enterprise documents stored within …

How to improve healthcare data security

Every company in every industry faces the risk of a data security breach, but organizations in the healthcare field need to constantly remain on guard. From insurance firms to patient care centers, healthcare organizations collect …

3 simple ways to celebrate Data Privacy Day

While most CISOs like to think that we’re protecting our employers’ sensitive data all the time, Data Privacy Day offers an opportunity for a reality check. It’s easy to focus on putting security measures in …

How to calculate the value of your data

To adequately manage data and protect it from security risks, you need to assess its contents and determine how it should be handled within your system. When files contain sensitive elements, such as a customer’s …