Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A recent survey conducted by SANS found that 32 percent of respondents said their firms do not have the ability to prevent an insider attack.
In the second half of 2014, Microsoft said it only received three requests from law enforcement for thirty-two users associated with an enterprise customer.
While an overwhelming majority of Hadoop users agree that data security is a critical requirement, most disagree or are not sure that its native security tools provide enough protection for their sensitive data, according to a recent survey.
Despite the focus on exotic zero-day exploits and sophisticated hacking techniques, IT teams are more concerned about more mundane risks to their organizations, such as risky employee behavior and cloud security.
HP has agreed to acquire Voltage Security, a provider of data security solutions, for an undisclosed sum.
Please join us on Tuesday, Feb. 3rd at 1PM ET for a special webcast: How To Avoid Being Tomorrow's Headline: Mitigating Insider Threats and Breaches, presented by Centrify.
Google has released a new version of End-to-End, an open source encryption extension for Chrome introduced by the company earlier this year.
Web browsers should inform users when they are accessing a website over the Hypertext Transfer Protocol (HTTP) to make them aware of the fact that there is no data security, the Chrome Security Team said in a proposal published over the weekend.
According to a survey of employees from organizations in the U.S., U.K., France and Germany found that 71 percent of end users said they had access to data they should not see.
DB Networks, a company focused on database security solutions, today announced that it has raised $17 million in new funding led by Grotech Ventures.

FEATURES, INSIGHTS // Data Protection

rss icon

Marc Solomon's picture
Just as they’ve embraced other technology innovations to advance their businesses, midsized organizations need a new approach to cybersecurity that mitigates risk to valuable digital assets.
Wade Williamson's picture
By establishing an enterprise-wide context focused on key assets and user behaviors, organizations can build a unified security framework that encompasses all locations and all of their assets.
Eddie Garcia's picture
Eddie Garcia explains how to grant user permissions to a subset of data in Hadoop and limit the type of operations the user is allowed to perform.
Torsten George's picture
Massive data breaches are raising doubts about whether organizations are investing their security dollars in the right areas.
Danelle Au's picture
A data breach plan lays out the key steps and the key personnel to involve when a data breach happens, and needs to incorporate three elements.
Travis Greene's picture
The combination of access governance and self-service access request and approval provides the best approach to strike back at the access clones.
Danelle Au's picture
When it comes to SaaS applications versus on-premise, there are three characteristics that define the need for a different approach to data governance, risk management and security in the cloud.
David Maman's picture
Through simple planning and forethought, organizations can ensure their databases not only meet compliance requirements, but will remain secure.
David Maman's picture
Moving sensitive data into the hands of third-party cloud providers expands and complicates the risk landscape in which companies operate every day.
Eddie Garcia's picture
By default, Hadoop is not secure and simply trusts that users are who they say they are. Within real business use cases, especially when confidential and sensitive data sets are involved, restricting access to only authorized users is critical.