Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Microsoft has released new guidance to help customers defend against credential theft stemming from Pass-the-Hash (PtH) attacks.
Introducing the bill to parliament this week, MP Vadim Dengin said "most Russians don't want their data to leave Russia for the United States, where it can be hacked and given to criminals."
The IEEE announced the launch of a new service designed to help the security industry respond more efficiently to the modern malware threat landscape.
A Google Drive issue that in certain cases exposed the original URLs of shared documents has been fixed by Google.
Organizations need to expand their mobile worldview to include data leakage, insider threats, and mobile malware and develop incident response plans that consider mobile devices.
The Dataguise for Data Governance suite enables organizations to easily declare policies, discover sensitive data, view and track entitlements, and audit access to sensitive data.
Onapsis, a provider of security solutions to protect SAP and Oracle platforms, announced that it has raised $9.58 million in funding.
Infrascale, a provider of cloud-based data protection solutions, announced that it has received $16.3 million in funding, and has agreed to acquire Eversync.
Foreign firms operating in the EU, including those that dominate the Internet, will be subject to a new data protection law which is still being finalized.
Mojave Networks has added a new feature to the company’s professional and enterprise services in an effort to help organizations minimize the risks posed by the mobile applications used by their employees.

FEATURES, INSIGHTS // Data Protection

rss icon

Jason Polancich's picture
In order to make our ecosystem a safer place for all of us, small and large, the big guys out there are going to have to start - at least in part - handling the security of their small business partners, suppliers and customers.
Danelle Au's picture
As the era of Internet of Things dawns, the amount of data and other cloud applications developed for unique industries will increase and bring a new era of privacy and security concerns.
Adam Ely's picture
Security teams and lines of business have reached a turning point on BYOD. It’s now become more important than ever for the CISO to figure out how to manage risk without inhibiting users.
Mark Hatton's picture
The fall of a high-profile CEO due to security concerns makes me envision a scenario where security is now given a more prominent role on the executive team, with more emphasis placed on avoiding the breach in the first place.
Joshua Goldfarb's picture
When performing incident response, an organization should proceed through various stages by following its incident response process. While all stages are important, when an enterprise is attacked, the highest priority quickly becomes moving rapidly from detection to containment.
Jon-Louis Heimerl's picture
When it comes to the security responsibilities of vendors, answers are still often behind where they need to be. What are some things to think about in the way you manage your security with your vendors?
Chris Hinkley's picture
When the development cycle moves quickly, it will often bypass security. When rapid development equates to shoehorning security controls in after the fact, we’re left with an approach that has potentially disastrous consequences.
Mark Hatton's picture
The oversight for the protection of healthcare information is only getting tighter, and it is incumbent upon the security teams to ensure healthcare professionals have all the tools necessary to improve patient outcomes, while we worry about keeping the bad guys away.
Wade Williamson's picture
If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.
Jon-Louis Heimerl's picture
The concepts of defense in depth have been with us for years -- hundreds of years, if not thousands. Maybe we can learn something from those architects of warfare from the Middle Ages?