With more data being moved out of on-premise environments, data needs to be classified and secured to an appropriate level to prevent it from being compromised. This embraces the practice of assessing the risk of data loss, mitigating those risks and applying adequate resources towards securing the data, both...
Federal investigators announced five more arrests this week in connection with a $45 million ATM cash-out and prepaid card fraud scheme. Learn why experts expect these types of crimes to become even more common.
FS-ISAC has issued a white paper with tips on streamlining third-party software risk assessments. One member of a new working group explains why the adoption of standard security controls is so critical.
The guidance discusses methods, techniques and best practices for the sanitization of target data on different media types and risk-based approaches organizations can apply to establish and maintain a media sanitization program.
The online dating website eHarmony has warned a "small fraction" of its users of a June 6 breach that likely exposed hashed passwords. Whether the incident is related to a LinkedIn breach has not been confirmed.
This white paper details solutions designed for government agencies that provide the visibility, control and automation needed to support asset management across the IT asset life cycle, planning, acquisition, management and disposition of software, hardware and related licenses.
The result is lower asset costs,...