It seems like each new day brings a new data breach announcement. Target, Neiman Marcus, Sally Beauty – each company had varying degrees of success with their breach response.
Are there any standard steps companies should take when identifying and disclosing data breaches?
Listen to episode 128 of our Security Slice podcast and hear Tim Erlin, Craig Young and Tyler Reguly discuss the line between detecting breaches and detecting fraud, what ever happened to DLP, and a the biggest drawback to security standards.
Click Here to Listen to the Podcast
- Security Slice: Plugging HTTPS Leakage
- Security Slice: World War XP
- Security Slice: Crowd-Sourced Security
- Security Slice: Rousing Router Research
Check out Tripwire SecureScan™, a free, cloud-based vulnerability management service for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology.
The Executive’s Guide to the Top 20 Critical Security Controls
Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].
Title image courtesy of ShutterStock