Home > RSS Feeds > Security
  • Brady & Kosofsky, which must adhere to a strict set of requirements that address how documents are stored and exchanged, turns to a secure storage solution.

  • In the rush to embrace the connected car, auto manufacturers failed on due diligence. At this point, they had better do whatever they can to put things right.

  • The health services provider turned to virtual desktops and a secure print solution to boost privacy and security, while cutting costs and improving efficiency.

  • Former White House cyber-security advisor Paul Kurtz offers insights into the changing state of enterprise cyber-security and the need for more collaboration.

  • With the ever-growing number of data breaches companies face, a corporate board must elevate its presence as a watchdog to ensure enterprisewide accountability in the interest of cyber-security. Toward this end, ISACA (previously known as the Information Systems Audit and Control Association) offers the following 12 questions that board members must ask of themselves and of their business and IT leaders to ensure that all factors affecting incident response, business continuity and information assurance are addressed. The questions are taken from a recent ISACA report, "The Cyber-Resilient Enterprise: What the Board of Directors Needs to Ask." Companies are taking, on average, 170 days to detect attacks from outsiders and 259 days when insiders are involved, according to the Ponemon Institute. Therefore, isolated security approaches are outdated, according to ISACA, which states that more cohesive, proactive strategies best position organizations to safeguard their informational assets. Organizations need to "connect protection and recovery to the mission and goals of the enterprise," according to the report, "implementing integrated programs in order to provide sustainability of essential services. Board members need to evaluate the operational risk inherent in digital business and direct management to ensure that the enterprise is more than just protected—it is resilient." By asking these questions, board members help ensure that key operations can proceed seamlessly even after an attack, and that advances in business technology will not invite potentially crippling risks. Here are the 12 questions—which IT and business leaders should be prepared to answer.

  • Enterprise fraud is nothing new, but digital technologies and ubiquitous communications have forever changed the stakes. Not only is it easier to move data and information across computer systems, but fraudulent activity can span multiple computers, organizations and industries. A new survey conducted by LexisNexis Risk Solutions surveyed 400 professionals about this topic and the key issues surrounding it. The "2015 LexisNexis Fraud Mitigation Study" found that multi-industry fraud is becoming more common, and it has a moderate to high financial impact on the organizations involved. Survey respondents also indicated that they see value in being able to access data and information about fraud cases that involve other organizations—both within and outside their industry. Noted Bill Madison, CEO, Insurance, LexisNexis Risk Solutions. "Status quo fraud mitigation is not enough for fraud schemes that are becoming increasingly sophisticated. Sharing more data will enable organizations to be armed with more effective tools in the fraud battle. The fact that data is not yet better shared across industries reveals an exposure for organizations combating … individuals and organized crime rings."

  • It may be impossible to prevent a breach, but the next best thing is to have a comprehensive response plan that can be swiftly and effectively executed.

  • A growing challenge for organizations of all sizes is the need to find and hire cyber-security talent. Rapidly evolving technology and increasingly sophisticated hackers and attackers are putting greater pressure on enterprises to build better defense systems. Unfortunately, most organizations can't keep up with the furious pace of change—and the associated risks. Moreover, a shortage of cyber-security experts has become the new normal. A new report, "Job Market Intelligence: Cyber-Security Jobs, 2015," provides an in-depth view of the topic. The study was conducted by job market analytics firm Burning Glass, which examined nearly 40,000 online sites. It found that while employers recognize the growing need for cyber-security talent, attracting and retaining that talent has become a daunting task. Not only is there a shortage of qualified candidates for many positions, but cyber-security workers demand—and receive—higher pay. There is no "quick-fix solution," according to Burning Glass CEO Matthew Sigelman, who adds, "The shortage of cyber-security workers is likely to persist, at least until the education and training systems catch up." Here are some of the key findings from the report.

  • Unhappy with its existing malware, the manufacturer deployed a security system that provides real-time threat containment and multi-layered endpoint defense.