{"id":528,"date":"2015-06-17T21:07:22","date_gmt":"2015-06-17T21:07:22","guid":{"rendered":"http:\/\/54.201.249.27\/?p=528"},"modified":"2015-06-17T21:07:22","modified_gmt":"2015-06-17T21:07:22","slug":"tripwire-data-location-and-risk-haunt-it-pros-dreams-reveals-study","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/tripwire-data-location-and-risk-haunt-it-pros-dreams-reveals-study\/","title":{"rendered":"TripWire: Data Location and Risk Haunt IT Pros\u2019 Dreams, Reveals Study"},"content":{"rendered":"

Today\u2019s evolving online threat landscape is challenging enterprises to make changes that will enhance their security. The threat of a data breach, for instance, is leading many organizations to invest in measures that will help protect their data.<\/p>\n

Even so, what intelligence is guiding these decisions remains uncertain. It is therefore an opportune moment to learn how and \u2013\u00a0to what extent \u2013 companies are using data security intelligence to minimize the possibility of a\u00a0data breach<\/a>, not to mention other risks that threaten their sensitive and confidential information.<\/p>\n

Fortunately, it was this purpose that motivated the publication of\u00a0The State of Data Security Intelligence<\/em><\/a>, a report sponsored by software development company\u00a0Informatica<\/a>\u00a0and conducted by the\u00a0Ponemon Institute<\/a>.<\/p>\n

In total, 1,663 IT security practitioners located in 18 countries,\u00a0working in a variety of\u00a0industry sectors were interviewed for the report. Their responses have yielded three key findings with respect to how organizations are using data security intelligence…<\/p>\n

 <\/p>\n

Read the full article\u00a0here<\/a><\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

Today\u2019s evolving online threat landscape is challenging enterprises to make changes that will enhance their security. The threat of a data breach, for instance, is leading many organizations to invest…<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8,10],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/528"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=528"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/528\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}