Security Experts:

long dotted


Thales Group, parent of Thales e-Security, has signed a definitive agreement to acquire data protection firm Vormetric for $400 million.
Facebook has announced a new measure meant to improve the security of user accounts, saying that it has begun notifying users on suspected account compromise.
Uber on confirmed that a software slip briefly exposed personal data of hundreds of US drivers.
Visa and FireEye launched Visa Threat Intelligence, a new offering powered by FireEye that delivers real-time threat information to merchants and payment card issuers.
Microsoft, Google and Mozilla will completely disable support for the RC4 cipher in their web browsers in early 2016.
Court rules that the FTC can sue companies that fail to protect their customers’ data. Wyndham is disappointed by the verdict.
Barracuda Networks has launched a new cloud storage service designed to give business users the ability to securely store, share, and access files from anywhere.
As more organizations become more comfortable with putting data in the cloud, they are aggressively applying varying levels of data protection to different types of information, according to a recent survey.
According to the results of a recent survey of 1,071 IT and IT security practitioners, most respondents said that more security incidents are caused by unintentional mistakes rather than intentional and/or malicious acts.
Microsoft said on Wednesday that its new Advanced Threat Analytics (ATA) solution will be available for general release next month.

FEATURES, INSIGHTS // Data Protection

rss icon

David Holmes's picture
Ron Rivest, the inventor of RC4, has improved the RC4 algorithm by adding a third index variable k and moving i through the array more quickly. This new, improved RC4 is called Spritz.
Marc Solomon's picture
To ensure you understand and can address the main security challenges cloud apps can introduce to your organization, you need additional visibility and context.
Marc Solomon's picture
Retailers must adopt a threat-centric approach to security with protection along the full attack continuum – before, during, and after an attack.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.
Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.
Wade Williamson's picture
Personally Identifiable Information (PII) can provide invaluable human intelligence to nation-state attackers who are often behind the most sophisticated attacks.
Travis Greene's picture
Does it really matter if someone steals your healthcare records? What would a hacker do with that information? Sell it? To whom and for what purpose?
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Wade Williamson's picture
In light of the seemingly endless parade of high-profile breaches, it’s easy to focus on external threats, while losing sight of insider threats.