1. Articles from Kacy Zurkus

    1-4 of 4
    1. Turn data from risk liability into an asset

      Big data has proven to be a big asset for corporations who are trying to collect information and make informed business decisions, but if the proper strategies for protecting that data are not in place, the risks to the enterprise can be costly. Earlier this year Cisco reported that worldwide mobile traffic is expected to grow eightfold from 2015 to 2020 reaching 30.6 exabytes, monthly.

      Read Full Article
    2. Social media, the gateway for malware

      Easy to access, widely used, and outside of enterprise control, social media sites are gold mines for malicious actors. People share a lot of seemingly innocuous information, which is exactly the kind of data that hackers love to collect and use in phishing or spear phishing campaigns. A recent NopSec 2016 State of Vulnerability Risk Management Report found that organizations use inadequate risk evaluation scoring systems. The report claimed that social media -- which often isn't included in any risk evaluation system -- is now a top platform for cybersecurity.

      Read Full Article
    3. Do third-party vendors have a bullseye on their backs?

      Because there are so many different kinds of third parties, identifying whether they do or don’t have the right infrastructure or security protocols can be a challenge. As so many organizations rely on a variety of different providers, third parties can become the gateways to the network. In order to mitigate the risk of a breach from a third party, enterprises need to design a vetting process and understand the language of the service-level agreemen in order to best evaluate their contracts.

      Read Full Article
    4. Why every CIO needs a cybersecurity attorney

      Cyber security has long been one of the main issues keeping CIOs awake at night. Now, with the number of high-profile cyber attacks seeming to increase each month, security is haunting IT leaders during the daytime, too. Distinguishing the technical experts from those responsible for legal obligations and risks will help companies develop better breach response plans. Understanding the role of an external cybersecurity firm will only help.

      Read Full Article
    1-4 of 4
  1. Topics in the News

    There are no recent topics in the news.

  2. Popular Articles

  3. Picture Gallery

    Fostering the Data Generation Begins at the Top Growth of hyperscale operators risks squeezing smaller players out of cloud, research warns OracleVoice: Surviving And Thriving In The Digital Economy: A Platform Approach Data center management in the cloud can predict downtime, vendors say Why you want Google's Allo China loads up on chip technology with new ARM license The Secret to IT Business Alignment Why ERP Systems Struggle to Deliver Business Value How Google tries to keep 'sneaky' spam from your inbox The Future Of Finance Is In Real Time What Salesforce’s expansion in Europe means for you Continuous healthcare: Big data and the future of medicine