Thought leadership is crucial within the threat intelligence sharing community and developing technologies that easily share and use threat intelligence, as a nation we can help agencies identify and stop attacks aggressively and quickly.
During the podcast, you can anticipate a healthy discussion on:
The value of...
Join our discussions as we talk with cyber industry experts and leaders about the various elements of the WHEO and how we can collectively work to elevate our nation’s cybersecurity posture.
So what exactly is regulated data?
It depends on the industry. Many regulations focus on personally identifiable information on individuals, such as Social Security numbers, addresses, or credit card numbers. It also can be computer access protection data (such as passwords) or protected patient health information...
As businesses all over the world struggle to survive the economic downturn, the pressure is compounded by security risks due to data leakage, data loss, and outside attacks - which have increased substantially over the past year. Information - and especially intellectual property - has become an attractive and...
Nearly 250 million records - from patient medical data to Social Security numbers - were exposed because of security breaches in 2008 alone. In a panic to avoid making headlines as the next company involved in a data breach, enterprises are rushing to acquire new technologies without considering best practices and...
In today's "knowledge economy," government data is a lucrative target for cybercriminals. A strong data governance program that complements data security is of paramount importance. There is so much for government CIOs to consider when it comes to protecting citizen data and sensitive government information. To...
While external threats to corporate data have made headlines, an even greater threat is posed by company employees. Sometimes, employees accidently expose sensitive data to the public by losing valuable data stored on a USB drive or laptop that is lost or stolen. At other times, disgruntled laid-off employees may...
"Noisy" threats like viruses, worms, and Trojans seem to get all the attention. But how aware is your CEO of the "quiet," insidious threats, like data loss and theft, which can have significant financial impact and may damage your company's brand? Often, investments in data protection are motivated solely by...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.