Security Experts:

long dotted


Researchers detail DiskFiltration, a method that allows hackers to steal data from air-gapped computers using hard drive noise [Read More]
Notorious cybercriminal selling account credentials of 200 million Yahoo users. Yahoo has yet to confirm the validity of the data [Read More]
Proxy attacks that work on most browsers and operating systems can be leveraged for phishing, information theft and DoS attacks [Read More]
A flaw in the Silk browser running on Amazon Kindle allowed hackers to intercept Google search traffic [Read More]
A new cyber espionage group called Dropping Elephant achieves a high success rate with only low tech attacks. [Read More]
Most businesses lack insight into the actual value of critical data assets that are targeted by cybercriminals, a recent report reveals. [Read More]
A third-party keyboard application for Android that had over 50 million installs was found to collect user data and send it to a remote server, researchers reveal. [Read More]
Windows 10 Anniversary update includes Windows Information Protection (WIP), a feature meant to keep user’s information safe even when data leaks occur. [Read More]
SecurityWeek approached a number of CIOs and chief security officers in major US companies to see how they handle the problem of data stored on recycled storage devices. [Read More]
A global database that stores information on risky individuals and organizations was left unprotected online [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Eddie Garcia's picture
This article explains how to encrypt data in a Hadoop cluster. The tools are available, and if you are brave enough, you could attempt this at home.
Eddie Garcia's picture
A common misconception about native HDFS encryption is the belief that the data is encrypted when written to disk on the data nodes like most disk encryption solutions.
Torsten George's picture
Google Dorking can be used to identify vulnerable systems and trace them to a specific place on the Internet.
Bill Sweeney's picture
Enterprises have to worry about the surface area that is open for attack and the challenge of detecting attacks quickly when they are occurring. In every instance simplification will help.
Wade Williamson's picture
Data science and machine learning models can assess large groups of cyber threats to find the subtle traits they have in common to better protect organizations.
Tim Layton's picture
The value of identifying your organization’s information out on the Dark Web can serve as a first-line indicator of a new breach that otherwise may go undetected for long periods of time.
Johnnie Konstantas's picture
DLP provides a range of business benefits, including compliance support and intellectual property protection. The concept isn’t a new one, but the ability to put it to use in an easier, more viable manner is.
David Holmes's picture
After designating 2014 as “The Year of the Mega-Breach,” the security community hoped to bring awareness to the challenge of protecting customer data. As it turns out, the breaches of 2015 make the previous year’s ones pale in comparison.
Rafal Los's picture
How many devices are showing up at the office this week that are an always-on conduit to your network from some external third party you really shouldn’t be trusting?
David Holmes's picture
Ron Rivest, the inventor of RC4, has improved the RC4 algorithm by adding a third index variable k and moving i through the array more quickly. This new, improved RC4 is called Spritz.