Security Experts:

long dotted


A global database that stores information on risky individuals and organizations was left unprotected online [Read More]
The DRM system used by Chrome for video streaming has a flaw that allows pirates to download movies from sites like Netflix [Read More]
Microsoft Azure Information Protection it combines the Azure Rights Management System (RMS) with the data classification and labeling technology acquired with the purchase of Secure Islands in November 2015. [Read More]
A hacker had accessed the video conferencing system of the Parti Libéral du Québec (PLQ) and eavesdropped on confidential meetings. [Read More]
Banking giant Morgan Stanley will pay $1 million as penalty for failure to protect customer information on roughly 730,000 clients, the Securities and exchange Commission (SEC) said Wednesday. [Read More]
RansomWeb attacks are on the rise and attackers have plenty of vulnerabilities they can exploit to hack website databases [Read More]
Researchers find several SQL injection vulnerabilities in the websites of the European Parliament and the European Commission [Read More]
Egnyte Protect provides access control and can be used to eliminate insecure links, unify permissions across content repositories, and to locate unusual access patterns to help locate and limit data leakage. [Read More]
A researcher claims to have found an unprotected database belonging to a major California electric utility [Read More]
The data breach disclosed by Tumblr in May affected over 65 million users who registered accounts up until early 2013 [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Torsten George's picture
Google Dorking can be used to identify vulnerable systems and trace them to a specific place on the Internet.
Bill Sweeney's picture
Enterprises have to worry about the surface area that is open for attack and the challenge of detecting attacks quickly when they are occurring. In every instance simplification will help.
Wade Williamson's picture
Data science and machine learning models can assess large groups of cyber threats to find the subtle traits they have in common to better protect organizations.
Tim Layton's picture
The value of identifying your organization’s information out on the Dark Web can serve as a first-line indicator of a new breach that otherwise may go undetected for long periods of time.
Johnnie Konstantas's picture
DLP provides a range of business benefits, including compliance support and intellectual property protection. The concept isn’t a new one, but the ability to put it to use in an easier, more viable manner is.
David Holmes's picture
After designating 2014 as “The Year of the Mega-Breach,” the security community hoped to bring awareness to the challenge of protecting customer data. As it turns out, the breaches of 2015 make the previous year’s ones pale in comparison.
Rafal Los's picture
How many devices are showing up at the office this week that are an always-on conduit to your network from some external third party you really shouldn’t be trusting?
David Holmes's picture
Ron Rivest, the inventor of RC4, has improved the RC4 algorithm by adding a third index variable k and moving i through the array more quickly. This new, improved RC4 is called Spritz.
Marc Solomon's picture
To ensure you understand and can address the main security challenges cloud apps can introduce to your organization, you need additional visibility and context.
Marc Solomon's picture
Retailers must adopt a threat-centric approach to security with protection along the full attack continuum – before, during, and after an attack.