‘Aha’ Moments From the ‘Verizon 2017 Data Breach Investigations Report’
This blog post was written by Rick Simon. The annual Verizon Data Breach Investigations Report (DBIR) was published today. Once...
Who Let the Data Out? Who, Who, Who, Who? (Part 3 of 3)
It feels like the last song of the concert—this is the final blog in our cybersecurity benchmark series! As every...
Key Lessons From Verizon’s ‘2016 Data Breach Investigations Report’
The annual Data Breach Investigations Report (DBIR) is out and reinforces the value of well-established cybersecurity practices. The good folks...
The Morning After: What Happens to Data Post-Breach?
This post first appeared on the security website Dark Reading. We need consumers and businesses to not simply shrug off...
Why Is the Verizon Data Breach Investigations Report Important to Me?
This blog was written by Bruce Snell. Every year Verizon releases their Data Breach Investigations Report (DBIR), sharing a wealth...
Verizon Report Foreshadows Breaches Originating With IoT Devices
This blog post was written by Rick Simon. Today, Verizon released its 2015 Data Breach Investigations Report (DBIR). As Verizon...
The Impact of Espionage: Business Confidential Data
If the cyber theft of intellectual property attacks an organization’s ability to innovate, theft of business confidential information attacks its...
Verizon DBIR: Noise & Attack Patterns Mapped to 20 Critical Controls
This blog was written by Barbara Kay. In our Security Connected discussions, security leaders routinely ask “Where do I invest...