TAP Into Technology Blog: Hacks and Breaches (12)
Anonymous vs. ISIS—A New Dimension of Cyber Warfare
A war is being waged in the wake of the devastating terrorist attack in Paris. But it’s not the kind of war you’ve read about and witnessed throughout your life. The President isn’t going to announce this war on television and you won’t be...
The Network Architect’s Guide to Scaling Security Programs
Security appliances have never been as important in the business world as they are now. Cyber crime is increasing at an alarming rate and CISOs at companies of all sizes are rushing to implement the latest and greatest security solutions....
The Challenges of Data Protection: Can Cyber Insurance Save You?
Major data breaches at companies of all size are telling us one thing—that businesses are struggling to deal with the challenges of data protection. Sophisticated cyber attacks are on the rise and the simple truth is that many companies...
The Target Data Breach—What Two Years Can Teach Us
Can you believe that we’re coming up on the two-year anniversary of the massive 2013 Target data breach? It may not feel that way because we’re still seeing news articles pop up regarding the aftermath of the incident, but it’s true....
2015 Cyber Security Report: How the Biggest Threats and Breaches Affect Businesses Processes
Security focus has shifted from what is being taken from businesses to how attackers are gaining access to enterprise systems. Symantec notes “the number of breaches rose 23 percent” and “there was a 26 percent increase in malware” from...
Data at Risk Series: Corporate Confidentiality Cyber Attacks
While we’ve looked at the state of cyber security in the healthcare, finance and insurance industries, it doesn’t begin to cover the breadth of threats out there. Industry-agnostic attacks are constantly threatening confidential corporate...