Yahoo’s user accounts hack a stark reminder of need for post-breach security risk strategies: Expert

When Yahoo Inc. on Thursday admitted that a “state-sponsored” hacker was able to abscond with 500 million user accounts, it...

September 23rd, 2016 Ryan Patrick

PIPEDA changes should prompt improved security stances and roadmap creation

Businesses are data driven, and enterprises are challenged to both leverage data effectively and manage it. This includes securing it,...

May 30th, 2016 Gary Hilson

Data breaches put the bottom line at risk as consumers lose trust in brands

Data breaches affecting consumers are usually big news, but often the focus is on the short-term impact on privacy and...

May 19th, 2016 Gary Hilson

Ottawa open for comments on proposed breach notification regulations

It's long been known that for many pieces of federal and provincial legislation, the regulations cabinet approves -- but the wording...

April 15th, 2016 Howard Solomon

data security,privacy,security

Privacy Commissioner recommends updates to 33-year-old Privacy Act

Canada's Privacy Commissioner is calling for a reform of the Privacy Act that would require public institutions to report data...

March 10th, 2016 Brian Jackson

Zero trust: Data breach prevention is all about breaking the kill chain

Breaches to enterprise security are often an inside, albeit unintentionally, thanks in part to the rise of privileged users. Once...

March 10th, 2016 Gary Hilson

Cybercrime is evolving to be more personal and surreptitious

Organizations need to think hard about why they might be a target of a data breach -- as well as think...

March 1st, 2016 Gary Hilson

Record high number of federal data breaches, says Canada’s privacy commissioner

The federal government suffered a record-high 256 data breaches during the 12 month period ending March 31, the privacy commissioner...

December 10th, 2015 Howard Solomon

Can you defend your data from breaches?

Dream for a minute – with a limitless security budget you can: Purchase the best firewall, intrusion detection, and intrusion...

Sponsored By: IBM