With the passing of the General Data Protection Regulation on May 25 and the recent controversy of Facebook/Cambridge Analytica, data privacy and governance are more important than ever. Richard Hogg, IBM Global GDPR Evangelist, discusses on IBM's internal journey to GDPR compliance and the risks
There are many right ways companies are using data: to know their customers better and to keep up with their needs and expectations to drive loyalty without sacrificing privacy. Here are some recommended reads that will help you learn how to stay on your customers’ good side while still gaining the
Does data extortion or ransom that targets the healthcare industry require different approaches to data breaches and protection than other industries? Despite opinions to the contrary, no cybersecurity crises are specific to the healthcare industry. Its organizations can use the same data
Data breaches are increasingly common, but your organization doesn’t have to be a victim. Discover how IBM i2 Enterprise Insight Analysis can help you proactively identify threats and combat the attackers who lie behind them.
Cyber criminals pose a significant threat to the public sector. Discover how cyber threat analysis can help you uncover the clues that cyber criminals leave behind, helping cyber intelligence analysts counter and mitigate new threats as they arise.
Cyber threat analysis is a critical component to any organizations security strategy today. Have you incorporated it into your strategy yet? Bob Stasio, Senior Product Manager of Cyber Intelligence at IBM i2 Safer Planet, comments on what exactly cyber threat analysis is in this week's Cyber Beat.
In a world of data insecurity, let no data breach pass without learning the lessons it has to offer. The data breach of Office of Personnel Management records teaches us three lessons, each vital for data security in organizations of all kinds.