Quantcast
Channel: TCDI
Browsing all 60 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Recent indictments reveal debit card fraud techniques

Eric Vanderburg On May 9, 2013, Federal prosecutors issued indictments against eight individuals for hacking and theft.  The case revealed the methods used by hackers to gain access to debit card...

View Article



Image may be NSFW.
Clik here to view.

Sharing is not always caring

Eric Vanderburg There are so many ways to share on social media today and users, especially the younger generation, are sharing almost everything.  The problem is that some data is not meant to be...

View Article

Image may be NSFW.
Clik here to view.

Companies with Virtual CSOs get ahead without losing an arm and a leg

Eric Vanderburg Security remains a complex discipline.  This ever-changing challenge grows in complexity daily as new threats emerge and compliance requirements increase.  Several regulations including...

View Article

Image may be NSFW.
Clik here to view.

JURINNOV Tweets Security

Vanderburg was recently listed as the number 10 information security leader to follow on Twitter in Information Security Buzz’s 25 Information Security Leaders to Follow on Twitter.  You can follow...

View Article

Vanderburg preventing identity theft on Twitter

I want to thank Amber Newby for listing me as the number 11 person on Twitter aiding against identity theft.  You can read her article here: Top 25 Twitter Accounts That Will Keep You on Top of...

View Article


Image may be NSFW.
Clik here to view.

Data Security Breaches at Retailers

Eric Vanderburg Security breaches and identity theft are becoming an increasing concern for consumers as hackers continue to target large retailers. Target, Sally Beauty Supply, Neiman Marcus, Home...

View Article

Image may be NSFW.
Clik here to view.

The Largest Internet Security Breach in History

The largest internet security breach in history has just been discovered. Hold Security, a small cybersecurity firm, first reported the details of the incident around August 5th, 2014. A group of...

View Article

Image may be NSFW.
Clik here to view.

Fighting Employee Apathy Towards Security

Eric Vanderburg Is it irritating when an employee loses a phone containing sensitive company information? Even more irritating is that the loss of such a device is almost considered by employees as a...

View Article


Image may be NSFW.
Clik here to view.

Investigating the Negative SEO Threat

Eric Vanderburg I read a recent Power More article by Mark Schaefer said that SEO content today is about insight rather than quality, and this reminded me of a case I worked on. As many of you know,...

View Article


Image may be NSFW.
Clik here to view.

Measuring Security Program Maturity

Eric Vanderburg As an organization becomes more conscious and engaged in protecting information, it progresses along a path of security maturity. I like to describe this path in five stages starting...

View Article

Image may be NSFW.
Clik here to view.

Security Career Networking Tips

Eric Vanderburg Do you know why all the major online retailers offer a way for users to review products? It’s because people want feedback from others when making a decision. Job searches are no...

View Article

Image may be NSFW.
Clik here to view.

The missing leg – integrity in the CIA triad

Eric Vanderburg Information security is often described using the CIA Triad. The CIA stands for Confidentiality, Integrity, and Availability and these are the three elements of data that information...

View Article

Image may be NSFW.
Clik here to view.

Preserving email integrity in eDiscovery

Eric Vanderburg I was recently asked the question, Can eDiscovery systems prove the integrity of the email that they discover? If so, how? Email differs from loose files in that emails are contained...

View Article


Image may be NSFW.
Clik here to view.

Which Security Career is Right for You?

Eric Vanderburg Security is a growing field, and with its growth come many different career options. As you gain experience in different security areas, you may choose to further specialize or move...

View Article

Image may be NSFW.
Clik here to view.

Cloudsizing: Finding the right fit for your cloud

Eric Vanderburg The maturation of the cloud is fascinating as it continues to adapt, providing more opportunities for companies and consumers to leverage the vast computing and storage power of...

View Article


Image may be NSFW.
Clik here to view.

No compromise with the hybrid cloud

Eric Vanderburg This statement may be familiar to many who have considered cloud services and it was both the start and end to many cloud discussions. What is most important to you, cloud security and...

View Article

Image may be NSFW.
Clik here to view.

4 ways to avoid holiday phishing on Black Friday

Eric Vanderburg Cybercriminals are raising the black flag this Black Friday and Cyber Monday. These are the biggest shopping days of the year and these criminals know that the sales ads and offers will...

View Article


Image may be NSFW.
Clik here to view.

Top security initiatives for 2016

Eric Vanderburg 2016 is going to be a big year for security. News of data breaches and the major technological innovations of 2015 will put more pressure on companies to implement effective...

View Article

Image may be NSFW.
Clik here to view.

Big Data ROI – How to use what you already have

Eric Vanderburg We may not be using more of our brains but we can probably use more of our data. Did you know that organizations typically use only 1 percent of the data they collect? Why is this and...

View Article

Image may be NSFW.
Clik here to view.

The human brain vs. computers in the identity challenge

Eric Vanderburg The concept of identity is core to the protection of data.  Data and other computing resources exist to be used by individuals, each of whom has an identity that is used to grant of...

View Article
Browsing all 60 articles
Browse latest View live




Latest Images