Cloud Security: What Higher Education Needs to Know

Cloud Security: What Higher Education Needs to Know by Ellucian

Rate this:

, , , , , ,

Leave a comment

Corporate Data: A Protected Asset or a Ticking Time Bomb?

Corporate Data: A Protected Asset or a Ticking Time Bomb? is a Ponemon Institute study sponsored by Varonis, surveying a total of 2,276 employees in US and European organizations (United Kingdom, Germany and France), including 1,110 individuals (hereafter referred to as end users) who work in such areas as sales, finance and accounting, corporate IT, and business […]

Rate this:

, ,

Leave a comment

Top 10 Cybersecurity Predictions for 2015 – an Infographic

Fuelled by cybercrime, cyber warfare, and cyber terrorism, the cost of cybersecurity and risk management will double in 2015.  That’s the bad news.  The good news is there will be a shift to cyber offense that will begin to stem the tide of cyber threats.

Rate this:

, , , ,

Leave a comment

In 2015 the Cost of Cybersecurity and Risk Management Will Remain on Track to Double

Coalfire, the leading independent information technology governance, risk and compliance (IT GRC) firm, today released its top ten cybersecurity predictions for 2015. “As 2014 ends, it is clear this was the year everything changed in the world of information security,” said Rick Dakin, Coalfire’s CEO and chief security strategist. “As high-profile data breaches were announced […]

Rate this:

, , , ,

Leave a comment

What you need to know about tokenization.

BluePay have produced a great graphic that provides a simple explanation of how Tokenization works.

Rate this:

, ,

Leave a comment

2015 Security Predictions

The full article can be found here.

Rate this:

, , , , , , ,

2 Comments

PCI DSS 2015 Poll. Are you planning anything different in light of v3.0?

Rate this:

, , , ,

Leave a comment

Follow

Get every new post delivered to your Inbox.

Join 1,571 other followers