Stockpiled stolen data can be used to profile and track targets with more dangerous attacks.
A prolific writer and analyst, Pam Baker’s published work appears in many leading print and online publications including Security Boulevard, PCMag, Institutional Investor magazine, CIO, TechTarget, Linux.com and InformationWeek, as well as many others. Her latest book is “Data Divination: Big Data Strategies.” She’s also a popular speaker at technology conferences as well as specialty conferences such as the Excellence in Journalism events and a medical research and healthcare event at the NY Academy of Sciences.
Recent articles by Pam Baker
- March 18, 2019
The Revised Payment Services Directive’s impact on organizations could be on par with GDPR.
- March 18, 2019
Legislators are working to drive cybersecurity standards in IoT.
- March 1, 2019
Nominet, the .UK registry, is ready to cut deals with U.S. VARs and MSSPs.
- February 20, 2019
Rather than stealing data, attackers corrupt its integrity to cause chaos and catastrophe.
- February 18, 2019
Retaliation at attackers once stopped, but now the battleground has shifted again.
- February 15, 2019
Distributed liability requires intense focus on new legal protections for MSSPs.
- February 14, 2019
The survey of CISOs also found that one in four suffer from stress-related health issues.
- February 13, 2019
A new survey reveals user preferences in security biometrics.
- February 1, 2019
A new study finds an unintended consequence of tighter U.S. immigration enforcement.
- January 31, 2019
This new organization offers open APIs for IoT gateways and edge servers.
- January 10, 2019
They’re already employed and comfortable. Here’s how to get them.
- January 8, 2019
No matter how tight their battle plans, the fear that something got through haunts CISOs.
- January 3, 2019
Is gamification just a fun trend that fails to actually score?
- January 2, 2019
Here’s the shortlist of certs and skills MSSPs and partners need now to compete and win in 2019.
- December 26, 2018
These seven will boost your business next year and prepare your company for an ever-changing future.
- December 5, 2018
Security isn’t just about technology — it’s about policies too.
- December 1, 2018
Consider using videos, interactive visualizations, quizzes, and gamification to upgrade training and refresher programs.
- November 8, 2018
The 2018 IT Security Trends Survey shows partners must illuminate emerging threats in IoT, edge computing and other fronts.