Fileless Malware: What Mitigation Strategies Are Effective?

Data Breach Today

Security Practitioners Highlight Ways to Fight Against the Threat As the threat of fileless malware continues to persist worldwide, security professionals are devising targeted risk management strategies

Japan's IoT Security Strategy: Break Into Devices

Data Breach Today

Nation to Allow Researchers to Brute-Force 200 Million Devices Japan plans to identity vulnerable internet of things devices the same way hackers do: by trying to log into them. The country wants to gauge its cybersecurity readiness for next year when it hosts the summer Olympics. If vulnerable devices are found, the plan is to notify device owners

White House National Cyber Strategy: An Analysis

Data Breach Today

Security Experts Examine Administration's Document and Rhetoric A national cybersecurity strategy document released by the White House last week - along with comments from a top Trump administration official that the U.S.

The US National Cyber Strategy

Schneier on Security

Last month the White House released the " National Cyber Strategy of the United States of America. And the strategy includes no details. I generally don't have much to say about these sorts of documents. They're filled with broad generalities.

Developing a PaaS Migration Strategy

Perficient Data & Analytics

In this blog we will look at the steps to create a migration strategy to PaaS including re-platforming legacy applications. Application migrations are often tied to a larger business-level, digital-transformation strategy.

A Fraud-Fighting Strategy for P2P Payments

Data Breach Today

Customer lifecyle data management can play an important role in cracking down on fraud tied to the growth in real-time P2P payments, says David Barnhardt of the security firm GIACT

FDA Reacts to Critique of Medical Device Security Strategy

Data Breach Today

Watchdog Agency Cited Deficiencies, But Agency Says Many Have Already Been Addressed The FDA's procedures for handling cybersecurity concerns in medical devices once they are on the market are deficient, according to a new federal watchdog agency report.

Organizations need to rethink their data architectures and strategies

Information Management Resources

Emerging technologies, dwindling resources, and rapidly increasing data requirements will drive the need to re-evaluate our data architecture and strategy. Data strategy Data management Hardware and software

Go-To-Market Strategy in the Clouds

Perficient Data & Analytics

After more than four years as part of the management consulting team, I am now responsible for launching our go-to-market (GTM) strategy for our firm’s cloud services. I’ve embarked on a new journey with Perficient.

Technology Strategies to Reduce False Positives

Data Breach Today

A Successful Strategy for Fighting Phishing

Data Breach Today

Brent Maher of Johnson Financial Group Offers Real-World Lessons Learned The key to lowering the risk of employees becoming victims of phishing is to adopt an "adult learning" approach to training, says Brent Maher, CISO at Johnson Financial Group

The 5 top trends for data governance strategies in 2019

Information Management Resources

Data governance Data management Data strategyAt the heart of all things data-oriented is the concept of data governance, which calls for proper protocols for data collection, storage, management, security and processing.

The Reaction to New White House Cybersecurity Strategy

Data Breach Today

Leading the latest edition of the ISMG Security Report: The reaction to the recently released White House cybersecurity strategy. Also featured: A discussion of GDPR's impact on class action lawsuits

4 Tips for Implementing a Mature Endpoint Security Strategy

Data Breach Today

Insights on Vulnerability Management and Incident Response An effective endpoint security strategy can be as layered as you want it to be. But you'll have a strong foundation if you build off of these four key steps

Tips 132

OpenText Extends Cloud Strategy with the Release of OpenText OT2

OpenText Information Management

I’m pleased to announce that today’s release of OpenText products, platforms and services further extends our enterprise cloud strategy, completing the need of our customers to access their business-critical information in the most convenient, secure and agile ways possible.

Necurs Botnet adopts a new strategy to evade detection

Security Affairs

The Necurs Botnet continues to evolve, a new strategy aims at hiding in the shadows, and leverages new payloads to recruits new bots. The post Necurs Botnet adopts a new strategy to evade detection appeared first on Security Affairs.

Incorporating privacy into data protection strategy

Information Management Resources

Enterprises should start from the top – by incorporating data privacy into the enterprise’s data protection strategy. This will set the direction in which the enterprise will move forward concerning the data privacy initiative. Data privacy Data security Cyber security

Planning Your Information Governance Technology Strategy

IG Guru

By Dan Griffith As part of your Information Governance strategy, you need a technology strategy. Your information governance technology strategy is a key element of your overall governance strategy […].

Three Fundamental Digital Preservation Strategies

IG Guru

The post Three Fundamental Digital Preservation Strategies appeared first on IG Guru.

Why capture is a key foundation of information management strategies

OpenText Information Management

Effectively connecting … The post Why capture is a key foundation of information management strategies appeared first on OpenText Blogs. Today’s number one business challenge is keeping track of information.

8 trends that will impact data management strategies in 2019

Information Management Resources

Data management Data strategy Chief Data OfficerAs organizations continued to see data volumes explode and an increasing number of employees need access to critical information, data cataloging considerations shifted from being a department level concern to an enterprise critical issue.

Exploring Cyber's Role in the New National Security Strategy

Data Breach Today

An analysis of the cyber component of the Trump administration's just-published National Security Strategy leads the latest edition of the ISMG Security. Also, DHS and industry establish a cyber coordinating council to help secure the U.S. electoral system

Understanding the role of automation in data management strategies

Information Management Resources

If you want to be fast and agile with your data, you need a strategy built on enabling you to do that. But your data strategy needs to include more than just raw processing power. Automation Data strategy Data management

Three Strategies for Big Data Security

Thales eSecurity

These are great tactics, but I’d like to discuss the three most common overarching strategies I see in Big Data security today. Strategies for Securing Big Data. The post Three Strategies for Big Data Security appeared first on Data Security Blog | Thales e-Security.

Best practices for aligning business strategy with data management

Information Management Resources

Data management Data strategy Data transparencyData is the engine that supports both strategic and operational decisions; these decisions depend on what you know and what you know depends on the information provided by the data.

Harness Your Enterprise Data Warehouse Strategy

Perficient Data & Analytics

A proper enterprise data strategy can empower a business. A data enterprise strategy is a well-rounded direction for an organization to potentially harness data-driven capabilities. A great enterprise data strategy is composed of 4 major factors. When the strategy is relevant, the information is contextual to the organization, therefore it’s not generic. This strategy should accelerate the business.

Despite widespread adoption, most firms still lack a formal cloud strategy

Information Management Resources

Whether it is public, private or a hybrid mix, cloud adoption is now widespread, but most organizations still lack a formal strategy around data migration and management in the cloud. Cloud computing Cloud hosting Data strategy

Preparing an Omnichannel Anti-Fraud Strategy

Data Breach Today

Many banking institutions boast of being "digital first" and enabling "omnichannel banking." But are they fully aware of the new fraud risks they also are inviting? Kimberly Sutherland and Kimberly White of LexisNexis Risk Solutions discuss how to mitigate omnichannel fraud

Data Strategy Framework: Handle with CARE

Perficient Data & Analytics

Therefore, it’s important to have data strategy framework in place. On a daily basis, I come across clients looking for a data strategy. Data Strategy Components. When developing a data strategy we like to use CARE to build the framework.

Insurers need to formalize IoT strategy

Information Management Resources

Telematics Internet of things Connected cars Connected home Growth strategies Big data Claims Property and casualty insurance Life insurance LexisNexisFour out of five carriers don't have a plan for collecting, analyzing or securing the flood of data from connected devices, according to LexisNexis survey.

Cybersecurity and the 2017 US National Security Strategy

Schneier on Security

Commentaries on the 2017 US national security strategy by Michael Sulmeyer and Ben Buchanan. cybersecurity nationalsecuritypolicy

5 Ways PDF Solutions Transform Digital Strategy

AIIM

But we need capable tools– here are 5 ways PDF solutions transform digital strategy with powerful benefits: Rapid Document Conversion. Check out this free Tip Sheet I've put together – Solve with PDF: 5 Ways PDF Solutions Transform Digital Strategy.

More organizations turn to hybrid cloud for data management strategies

Information Management Resources

Cloud computing Data management Data strategyThe options can be any combination of multiple public clouds, or more traditionally the public cloud augmenting and adjusting the technology use within the organization to better fit the client needs.

Cross cultural aspects of breach response strategies

DXC Technology

The phones are ringing off the hook at headquarters, your web site traffic is exploding and your email boxes have reached capacity. Your enterprise systems have been hacked, exposing millions of confidential customer personal and financial records. It’s impossible to determine where in the world the hack originated, but the implications are surely global […]. Security data breaches

My Latest Article Published at Document Strategy Magazine

Getting Information Done

I attended two recent presentations that offered some practical strategies to help information governance professionals align and present project initiatives in a way that will help get them funded.

4 key steps to building a comprehensive data strategy

Information Management Resources

Data strategy Data management Data visualizationOrganizations that develop and implement a strategic plan are fundamentally better prepared to anticipate, manage and capitalize on the increasing challenges and possibilities of data.

8 crucial factors in charting a health info exchange strategy

Information Management Resources

Providers face a range of complex options in forming a data sharing strategy, from using exchange standards to building a specialized HIE. HIE Data strategy

AI for Insight: Three things we learned at the Forrester Data Strategy and Insights Forum

OpenText Information Management

The problem, though, is that many companies haven’t figured out how … The post AI for Insight: Three things we learned at the Forrester Data Strategy and Insights Forum appeared first on OpenText Blogs. We live in an age of unequaled access to data.

LEAP makes perfect fit in OpenText™ cloud services strategy

OpenText Information Management

LEAP had truly found a home as it was the perfect fit into the OpenText™ Cloud Services strategy. It’s been one year now since we announced our acquisition of Documentum, InfoArchive, Captiva, and LEAP SaaS Platform and Applications.

Data governance goes ambient with a digital strategy

Information Management Resources

Data governance Data ownership Data strategyData governance is a necessary investment and effort to drive value and monetize our data as well as avoid business risk. The issue at hand: Why does it have to be so hard? Why can’t data just work?