Security Experts:

long dotted


The researcher who found dozens of misconfigured databases now says the total count has reached 30 million exposed credentials [Read More]
Patient data breaches affect 90% of industries, according to Verizon’s 2015 Protected Health Information Data Breach Report. [Read More]
Digital Guardian, a Waltham, Mass.-based data protection solutions firm, has secured $66 million in additional financing. [Read More]
An increasing number of poorly configured MongoDB instances are exposed on the Internet, Shodan search shows [Read More]
Publicly accessible databases exposed 25 million accounts, including 13 million belonging to MacKeeper users [Read More]
Google this week announced Data Loss Prevention (DLP) for Gmail, designed to help Google Apps for Work customers keep their sensitive information secure. [Read More]
Hashcat, the popular password recovery utility advertised as the world’s fastest password cracker, has been released as open source [Read More]
BitLocker, the disk encryption solution implemented in the Windows operating system starting with Windows Vista, does not require sophisticated tools or tactics to be bypassed on systems that do not have the latest patches from Microsoft installed, security researcher Ian Haken claims. [Read More]
Microsoft has put new data centers in Germany under the control of Deutsche Telekom, the companies said, in a move that will keep privacy-sensitive Germans' customer data in the country. [Read More]
Microsoft has signed an agreement to acquire privately-held Israeli data protection firm Secure Islands for an undisclosed sum. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Johnnie Konstantas's picture
DLP provides a range of business benefits, including compliance support and intellectual property protection. The concept isn’t a new one, but the ability to put it to use in an easier, more viable manner is.
David Holmes's picture
After designating 2014 as “The Year of the Mega-Breach,” the security community hoped to bring awareness to the challenge of protecting customer data. As it turns out, the breaches of 2015 make the previous year’s ones pale in comparison.
Rafal Los's picture
How many devices are showing up at the office this week that are an always-on conduit to your network from some external third party you really shouldn’t be trusting?
David Holmes's picture
Ron Rivest, the inventor of RC4, has improved the RC4 algorithm by adding a third index variable k and moving i through the array more quickly. This new, improved RC4 is called Spritz.
Marc Solomon's picture
To ensure you understand and can address the main security challenges cloud apps can introduce to your organization, you need additional visibility and context.
Marc Solomon's picture
Retailers must adopt a threat-centric approach to security with protection along the full attack continuum – before, during, and after an attack.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.
Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.
Wade Williamson's picture
Personally Identifiable Information (PII) can provide invaluable human intelligence to nation-state attackers who are often behind the most sophisticated attacks.