Security Experts:

long dotted


The Clinton Foundation has denied being hacked by Guccifer 2.0 and some evidence suggests that the hacker’s claims could be false [Read More]
EMC has patched several critical and high severity vulnerabilities affecting the management interface of VMAX enterprise storage products [Read More]
In a recent survey, confidence in a successful Disaster Recovery (DR) failover was only substantiated in 38% of cases, as fifty-eight percent of respondents experienced issues during a failover. [Read More]
More than a dozen vulnerabilities have been patched in OpenSSL with the release of versions 1.1.0a, 1.0.2i and 1.0.1u [Read More]
On September 22, OpenSSL will patch several vulnerabilities, including two classified as moderate and high severity [Read More]
A vulnerability related to certificate pinning allows sophisticated MitM attackers to deliver malicious add-ons to Firefox and Tor Browser users [Read More]
A group of hackers calling itself Fancy Bears, believed to be linked to Russia, has leaked confidential data on 25 additional athletes [Read More]
Hackers breached servers of paid-to-click service ClixSense and stole 6.6 million user records and source code [Read More]
Over 320,000 financial records likely stolen from payment processor BlueSnap or its customer Regpack, but neither of them admit being breached [Read More]
Hackers breached the systems of Russian instant messaging service QIP in 2011 and stole the details of 33 million users [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Steven Grossman's picture
Beginning November 30, 2016, DoD third party contractors will be required to establish and maintain an insider threat program.
Eddie Garcia's picture
This article explains how to encrypt data in a Hadoop cluster. The tools are available, and if you are brave enough, you could attempt this at home.
Eddie Garcia's picture
A common misconception about native HDFS encryption is the belief that the data is encrypted when written to disk on the data nodes like most disk encryption solutions.
Torsten George's picture
Google Dorking can be used to identify vulnerable systems and trace them to a specific place on the Internet.
Bill Sweeney's picture
Enterprises have to worry about the surface area that is open for attack and the challenge of detecting attacks quickly when they are occurring. In every instance simplification will help.
Wade Williamson's picture
Data science and machine learning models can assess large groups of cyber threats to find the subtle traits they have in common to better protect organizations.
Tim Layton's picture
The value of identifying your organization’s information out on the Dark Web can serve as a first-line indicator of a new breach that otherwise may go undetected for long periods of time.
Johnnie Konstantas's picture
DLP provides a range of business benefits, including compliance support and intellectual property protection. The concept isn’t a new one, but the ability to put it to use in an easier, more viable manner is.
David Holmes's picture
After designating 2014 as “The Year of the Mega-Breach,” the security community hoped to bring awareness to the challenge of protecting customer data. As it turns out, the breaches of 2015 make the previous year’s ones pale in comparison.
Rafal Los's picture
How many devices are showing up at the office this week that are an always-on conduit to your network from some external third party you really shouldn’t be trusting?