Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Attackers may have stolen information on unpatched vulnerabilities after hacking a Microsoft bug tracker back in 2013 [Read More]
IT security professionals, particularly executives, admit snooping on the corporate network, One Identity study shows [Read More]
BlackBerry patches two vulnerabilities, including code execution flaw, in Workspaces Server [Read More]
DHS issues binding operational directive requiring all federal agencies to use HTTPS, DMARC and STARTTLS [Read More]
Microsoft, Google, HP, Lenovo and Fujitsu warn customers of crypto vulnerability in Infineon chips [Read More]
Pizza Hut hacked. Users who placed an order on the website or via the mobile app may have had their credit card data stolen [Read More]
Siemens patches two vulnerabilities, including one rated high severity, in building automation controllers [Read More]
Sample data provided by scammers claiming to have hacked Equifax may have come from another company’s unprotected QA servers [Read More]
Unpatched SQL injection vulnerabilities in BPC’s SmartVista payment platform can expose sensitive information [Read More]
Accenture leaks over 100GB of data, including private keys and credentials, via four unprotected cloud storage containers [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.
Alastair Paterson's picture
What can U.S.-based companies do to prepare for the GDPR that is due to come into force in May 2018? These five steps can help.
Jennifer Blatnik's picture
Almost every industry can improve efficiencies with blockchain. But what will make blockchain a success is ultimately security.
Steven Grossman's picture
Organizations are increasingly combining UEBA technology with other data sources and analytics methods to overcome cyber risk challenges on a broader scale.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Erin O’Malley's picture
The CIA conducts extensive background investigations and requires polygraph examinations to gain a security clearance, yet a malicious insider apparently made off with a trove of secret CIA hacking tools.
Ashley Arbuckle's picture
The healthcare industry has a lot to gain by digital transformation. However it also has a lot to lose if it doesn’t start with security as a foundation.
Travis Greene's picture
Whether US government officials improve their handling of classified information in the new administration or not, industry can certainty learn from the blunders and reduce risks.
Eddie Garcia's picture
To reduce the chances of falling victim to an insider-driven breach, security and risk professionals should start by learning what their available data can tell them.
Aditya Sood's picture
The cloud is here to stay, and so long as employees use cloud apps from within an organization’s firewall, we’ll always have to wrangle with Shadow IT, Shadow Data and the attendant problems and risks.