Data breach

Data breach News

View All News

Data breach Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Data breach Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Mastering the cloud contract

    Cynthia Nustad recalls a time not that long ago when businesses didn't have much flexibility in negotiating contracts with cloud providers. "Maybe you could negotiate on price or add-ons, but the core service was pretty vanilla and hardened," said the CIO at HMS, a healthcare management services company. Back then, agreements that had the provider assuming part of the risk in the event of a breach were a no-go. Today, however, things have markedly changed. The rapid growth of cloud computing has given IT leaders an edge when it comes to negotiating a cloud contract.

    In this issue of CIO Decisions, get advice from CIOs and experts on how to procure more safeguards and custom features in your cloud contract that address your business needs. Also in this issue, we walk through UPS' journey from analog to digital business; outline common mistakes companies make when implementing hybrid cloud; take a look at what's under the hood of Etsy's business model; talk to former McCormick CIO Jerry Wolfe about how the spice company is using its platform business model to shake up the food industry; and examine why getting the most out of knowledge workers today requires "Supportive Leadership." Continue Reading

  • The best endpoint security approach in this interconnected age

    Some endpoint security suites have reached a level where they create almost all the capabilities of an enterprise in microcosm. New emphasis has been placed on protections that don't depend on traditional static scanning, but how well are these various approaches (whitelisting, sandboxing and so on) working out? And could the cloud possibly be the best endpoint security solution in today's mobile age? This handbook looks at the current state of endpoint protection and offers tips on how to best ensure endpoint security in the future.

    SearchSecurity contributors examine the question of how best to secure endpoints, and provide actionable advice. Karen Scarfone questions the all-too-common assumption that using the cloud undermines security, and also outlines specific ways in which cloud-based tools can be useful in improving endpoint security. In a separate chapter, Scarfone considers whether the best endpoint security is achieved by combining tools and methods -- that is, by using an endpoint security suite. Ed Tittel focuses on the threat to endpoint security from malware and how antimalware tools can beef up defenses, offering scenarios that show how antimalware products work to secure endpoints. Continue Reading

  • Why did Anthem resist government vulnerability assessments?

    Vulnerability assessments are often a requirement for organizations that have suffered a data breach and the assessors' results can be invaluable to protect a business. Continue Reading

View All Evaluate

Manage Data breach

Learn to apply best practices and optimize your operations.

  • How to ensure a secure API

    Application program interfaces, or APIs, are nothing new in the IT world, but over the past ten years, public-facing APIs have risen from a handful to over 10,000. The function of APIs is to add capabilitiies to Web applications and mobile apps, allowing the automation of common processes that interact with services on other machines. APIs, in other words, let programs and websites "talk" to each other, which means APIs allow those programs and websites to provide even greater value to the end users.

    Like almost all good things in the world of IT, this raises security questions. When developers create an API, they can also inadvertently open a window to hackers. So this three-part guide looks carefully at both the nature of the security risk and also outlines best practices for managing your organization's use of outside APIs in a secure fashion, as well as making sure that any API's you make publicly available are not opening you up to attack. Continue Reading

  • Cybersecurity risk management benefits from analytics, reporting

    Data breaches continue to threaten businesses, but companies are turning to data analytics to help identify vulnerabilities and make cybersecurity risk management more efficient. Continue Reading

  • CSA Guide to Cloud Computing

    In this excerpt of CSA Guide to Cloud Computing, authors Rai Samani, Brian Honan and Jim Reavis review cloud security threats based on research by the CSA's Top Threats Working Group. Continue Reading

View All Manage

Problem Solve Data breach Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve