Rise in data breaches drives interest in cyber insurance
Companies became much more interested in insurance policies after an incident affected them, study found
John P. Mello | 15 Aug | Read more
Companies became much more interested in insurance policies after an incident affected them, study found
John P. Mello | 15 Aug | Read more
State Attorney General report reveals some businesses reluctant to scramble data to protect it
John P. Mello | 03 Jul | Read more
A company's brand also takes a big hit after a data breach
John P. Mello Jr. | 27 Feb | Read more
For the second year running, hacking was the most frequent source of data breaches, according to a new report based on known incidents in 2012.
Smartphone insecurity means healthcare patient information, for one, remains at high risk, studies find
Taylor Armerding | 12 Dec | Read more
While the healthcare industry moves to invest billions into electronic health records, <a href="http://www.csoonline.com/article/690758/healthcare-security-needs-a-booster-shot">a steady trail of breaches and broken promises of security</a> is starting to take its toll on patient trust.
George V. Hulme | 22 Nov | Read more
Websense 'Security Pros and Cons' survey of 1,000 IT managers confirms that data breaches are widespread. Here's a look at how organizations are responding.
Ellen Messmer | 21 Oct | Read more
Despite the current focus on security stemming from the massive data breaches that resulted from hackers exploiting low- and high-level system vulnerabilities, few businesses in the UK and Australia are interested in auditing systems -- even when they're free.
Tokenisation replaces protected data with a digital placeholder that applications use just as they would real Social Security or credit card numbers. But if you're hacked, the data is useless to criminals.
Robert McMillan | 04 Nov | Read more
As we noted in last year's CSO article, "Six ways we gave up our privacy," people are increasingly -- and willingly -- throwing their privacy to the wind, thanks to an addiction to Google apps, GPS devices, the BlackBerry, iPhone and Android, and social networking sites like Facebook and Twitter. Some security experts believe privacy is dead already.
Bill Brenner | 27 Oct | Read more