IN 2013, there were 1,367 confirmed data breaches impacting consumers’ financial information.
August 1, 2014
Consumers who are dissatisfied with how they are treated by their financial institution following fraud sometimes change providers, resulting in a global attrition rate of 23 percent.
Representatives from Tesla Motors Inc., say the company will be investigating and rectifying any vulnerabilities discovered as a result of a hacking contest in Beijing starting today, of which the Tesla Model S sedan is the key target.
Nearly 70 percent of critical infrastructure companies surveyed by Unisys and the Ponemon Institute suffered a security breach in the last year. According to the report, “Despite staggering statistics around the number of security breaches within these sectors, results showed that they gap between security concern and preparedness is overwhelming.”
As a child, I played soccer fervently. My father, a German immigrant to the U.S. who was very passionate about the sport, explained to me that there is no game that brings the world closer together.
The tool does not require identifying information, and it does not collect data without opt-in permission.
June 1, 2014
Tool users, including information-security, risk, financial and other senior executives, can input a range of expenses and estimated costs for either a specific scenario or actual breach, and the app, sponsored by Booz Allen Hamilton, would generate a comprehensive report explaining the total cost and enabling a cost-benefit analysis of security strategies.
Get to know Taylor Carr, Vice-President, Business Development & Integration for Securadyne Systems, and learn how Securadyne’s enterprise security executive customers are addressing cybersecurity in their enterprises.
May 1, 2014
Virtually all of the new video solutions we have deployed over the past few years have been IP-based. However, we still have many customers with existing large analog systems, and they need to operate, expand and optimize those systems today.
A new Ponemon Institute survey suggests key cybersecurity deficits, disconnects and low attack visibility in many enterprises.
April 30, 2014
The survey of nearly 5,000 global IT security professionals reveals a deficit in enterprise security systems, a disconnect in how confidential data is valued and limited visibility into cybercriminal activity. The report gives new insight into why cybercriminals have a foothold in the broader enterprise.