Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researchers found 76 popular iOS applications that allow attackers to silently intercept TLS-protected data [Read More]
InterContinental has confirmed that its payment card processing systems have been breached - 12 hotels in the Americas region are affected [Read More]
The hacker who targeted mobile forensics firm Cellebrite has leaked some tools stolen from the company’s systems [Read More]
Cybercriminals are increasingly using dark web forums to recruit insiders that can help them make a profit [Read More]
VMware has patched important vulnerabilities in some of its AirWatch applications for Android [Read More]
Google expands certificate authority (CA) efforts with the launch of Google Trust Services and the company’s own root CA [Read More]
U.S. President Donald Trump's executive order titled 'Enhancing Public Safety in the Interior of the United States' appears to threaten the future of the EU/US Privacy Shield, but that may not be the case. [Read More]
Rumors circulating on hacker forums claim the controversial LeakedSource website was shut down following a law enforcement raid [Read More]
There were 4,149 data breaches reported during 2016, resulting in the total number of exposed records reaching 4.281 billion. [Read More]
OpenSSL has patched four low and moderate severity vulnerabilities, including DoS and carry propagation issues [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Ashley Arbuckle's picture
The healthcare industry has a lot to gain by digital transformation. However it also has a lot to lose if it doesn’t start with security as a foundation.
Travis Greene's picture
Whether US government officials improve their handling of classified information in the new administration or not, industry can certainty learn from the blunders and reduce risks.
Eddie Garcia's picture
To reduce the chances of falling victim to an insider-driven breach, security and risk professionals should start by learning what their available data can tell them.
Aditya Sood's picture
The cloud is here to stay, and so long as employees use cloud apps from within an organization’s firewall, we’ll always have to wrangle with Shadow IT, Shadow Data and the attendant problems and risks.
Steven Grossman's picture
Beginning November 30, 2016, DoD third party contractors will be required to establish and maintain an insider threat program.
Eddie Garcia's picture
This article explains how to encrypt data in a Hadoop cluster. The tools are available, and if you are brave enough, you could attempt this at home.
Eddie Garcia's picture
A common misconception about native HDFS encryption is the belief that the data is encrypted when written to disk on the data nodes like most disk encryption solutions.
Torsten George's picture
Google Dorking can be used to identify vulnerable systems and trace them to a specific place on the Internet.
Bill Sweeney's picture
Enterprises have to worry about the surface area that is open for attack and the challenge of detecting attacks quickly when they are occurring. In every instance simplification will help.
Wade Williamson's picture
Data science and machine learning models can assess large groups of cyber threats to find the subtle traits they have in common to better protect organizations.