Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Bitdefender has unveiled a new technology designed to secure virtualized environments through hypervisor-level inspection.
Two memory corruption vulnerabilities (CVE-2015-2282, CVE-2015-2278) were found in the compression libraries used by almost all SAP Netweaver products
The security industry comments on the latest Verizon Data Breach Investigations Report (DBIR).
WikiLeaks published thousands of documents on Thursday from last year's Sony hacking scandal, calling them an insight into the inner workings of a "secretive" firm.
Cybersecurity startup Illumio has closed a massive $100 million Series C financing round, bringing the total raised by the company to more than $142 million in just over two years.
Washington is "aggressively" warning Beijing over the repercussions of its demand that US tech firms should hand over their encryption keys if they want to do business in China.
Verizon's 2015 Data Breach Investigations Report (DBIR) analyzed 79,790 security incidents and 2,122 confirmed data breaches across 61 different countries.
A recent survey conducted by SANS found that 32 percent of respondents said their firms do not have the ability to prevent an insider attack.
In the second half of 2014, Microsoft said it only received three requests from law enforcement for thirty-two users associated with an enterprise customer.
While an overwhelming majority of Hadoop users agree that data security is a critical requirement, most disagree or are not sure that its native security tools provide enough protection for their sensitive data, according to a recent survey.

FEATURES, INSIGHTS // Data Protection

rss icon

Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Wade Williamson's picture
In light of the seemingly endless parade of high-profile breaches, it’s easy to focus on external threats, while losing sight of insider threats.
Mark Hatton's picture
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.
Marc Solomon's picture
Just as they’ve embraced other technology innovations to advance their businesses, midsized organizations need a new approach to cybersecurity that mitigates risk to valuable digital assets.
Wade Williamson's picture
By establishing an enterprise-wide context focused on key assets and user behaviors, organizations can build a unified security framework that encompasses all locations and all of their assets.
Eddie Garcia's picture
Eddie Garcia explains how to grant user permissions to a subset of data in Hadoop and limit the type of operations the user is allowed to perform.
Torsten George's picture
Massive data breaches are raising doubts about whether organizations are investing their security dollars in the right areas.
Danelle Au's picture
A data breach plan lays out the key steps and the key personnel to involve when a data breach happens, and needs to incorporate three elements.
Travis Greene's picture
The combination of access governance and self-service access request and approval provides the best approach to strike back at the access clones.
Danelle Au's picture
When it comes to SaaS applications versus on-premise, there are three characteristics that define the need for a different approach to data governance, risk management and security in the cloud.