5 Tips for Managing the Data Breach Risk

Sensitive, personally identifiable information (PII) such as names, account numbers, trading and other financial information are collected and used for virtually every customer and internal corporate function: HR; marketing; sales; customer support; technical support; product development; investor relations; regulatory compliance … the list goes on. Companies also handle sensitive data related to intellectual property (IP)…

3 Common Sense Strategies for Managing Financial Data

While it has always been vital for entities handling financial information — account identifiers, investment records, account balances, transaction fees, payment card information, credit reports, and the like — to take appropriate privacy and data security precautions, never before has it been quite the pressing concern that it is today. The rapid deployment of innovative…

Do We Need a National Data Security Bill?

There is only one primary driver for investing in security and that is the threats to your data and computing infrastructure. However, a secondary driver that often overshadows even the threats is compliance. More Articles from Richard Stiennon on CIO Update Network Admission Control is a Blind Alley Lessons Learned from Biggest Bank Heist in…