A group of former and current students have sued Google in federal court in San Jose, California, alleging that the company scanned their Gmail accounts and gathered data for advertising purposes. [Read More]
Dell announced the availability of a new enterprise endpoint security solution that now features post-boot BIOS verification, along with integrated threat protection technology powered by Cylance. [Read More]
In a statement provided in response to multiple inquiries by SecurityWeek, former Norse CEO Glines admitted to making mistakes in managing the company, but also contended that Krebs’ report contained inaccuracies. [Read More]
Threat intelligence has little value unless it is put into context of an organization’s security posture. Most enterprises don’t have the resources to apply the required logic to correlate external threat data with their internal security intelligence.
As security professionals, it’s our job to enable business while protecting it; embracing social media is an imperative, but we also need to mitigate the exploitation of what our organizations reveal online.
The investment in access certifications have reduced the workload on IT, but by treating all entitlements and users the same, we’ve put the burden on LOB managers to manage the risk of excessive access.
DLP provides a range of business benefits, including compliance support and intellectual property protection. The concept isn’t a new one, but the ability to put it to use in an easier, more viable manner is.