data breach IBM governance, policies, protection deep web data governance compliant leak database security

IBM: Cost of a Data Breach Hits Another High

The average cost to an organization hit with a data breach reached a record high this year, though those companies are split on who they believe should foot the bill, according to ...
Security Boulevard

Forbes: Vulnerability Backlogs Are A Dangerous Time Suck

Vulnerability backlogs imperil our organizations when it comes to security. With budget tights and resources limited, time is money. And in security, we are in a race against time to both avoid ...
CISO culture SASE, single-vendor, Palo Alto Networks SASE network engineer endpoint Qualys security culture Palo Alto Networks SASE network VPN cybersecurity culture

Endpoint Sprawl Raises Security Risks

The explosion of endpoint devices is making it even more challenging for IT departments and security teams to obtain both visibility and control over these devices. According to a new report from ...
Security Boulevard

Guest Blog: The Need to Close the Cultural Divide Between Application Security and Developers

In this guest blog post, Dr. Larry Ponemon and Susan Jayson of Ponemon Institute discuss the findings of their recent research… The post Guest Blog: The Need to Close the Cultural Divide ...

Why Digital Certificate Management is Business-Critical

This blog features insights from Keyfactor’s Chief Security Officer, Chris Hickman on the 2020 Keyfactor-Ponemon Institute Report: The Impact of Unsecured Digital Identities. Click Here to download and access the full report ...

Scaling PKI Operations: Top 4 Issues to Avoid

This blog features insights from Keyfactor’s Chief Security Officer, Chris Hickman on the 2020 Keyfactor-Ponemon Institute Report: The Impact of Unsecured Digital Identities. Click Here to download and access the full report ...

PKI Deployment Challenges & How To Avoid Them

This blog features insights from Keyfactor’s Chief Security Officer, Chris Hickman on the 2020 Keyfactor-Ponemon Institute Report: The Impact of Unsecured Digital Identities. Click Here to download and access the full report ...

How Edward Snowden made us think about and forget the Insider Threat

Five years ago, the news media went into a frenzy after The Guardian revealed details about National Security Agency (NSA) surveillance activities. The news was based on classified documents that former NSA ...

Monday, June 4, Dtex in the News: Got Vulnerable People? Facebook has 2 Billion, Dtex Provides Dark Reading Advice on How to Protect Them

When thinking about the insider threat, it is easy to focus on Edward Snowden, Chelsea Manning, and lawsuits between companies like Uber and Waymo. This is because the term itself conjures images ...