Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A massive data leak from Panama Law Firm Mossack contains 2.6 terabytes of data, including 4.8 million emails, 2.2 million PDFs, and millions more images and text documents. [Read More]
Data protection startup Vera has launched its new cloud-based Information Rights Management (IRM) platform. [Read More]
The personal details of thousands of foreign nationals living in southern Thailand were briefly leaked online in what the site's developer admitted was a data breach during a test for police. [Read More]
A survey conducted among IT security pros at US federal agencies shows that most of them feel their organization is vulnerable to data threats [Read More]
Updates released by Apple for iOS and OS X patch serious flaws that can be exploited to decrypt content sent via iMessage [Read More]
Vulnerability in Apple’s iMessage application allows hackers to access encrypted photos and videos [Read More]
A researcher has found an openly accessible database storing the details of 198,000 people who had used a now-defunct iPhone app [Read More]
Google starts tracking the state of HTTPS on the top 100 third-party websites in an effort to monitor the progress of encryption efforts [Read More]
After significant backlash, Amazon has changed its stance on full disk encryption for its Kindle Fire devices, and will bring back the data protection measure in the near future. [Read More]
Amazon has killed support for encryption on Kindle Fire devices and quietly removed it from Fire HD and Fire HDX 8.9 devices with the release of Fire OS 5 in February. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Bill Sweeney's picture
Enterprises have to worry about the surface area that is open for attack and the challenge of detecting attacks quickly when they are occurring. In every instance simplification will help.
Wade Williamson's picture
Data science and machine learning models can assess large groups of cyber threats to find the subtle traits they have in common to better protect organizations.
Tim Layton's picture
The value of identifying your organization’s information out on the Dark Web can serve as a first-line indicator of a new breach that otherwise may go undetected for long periods of time.
Johnnie Konstantas's picture
DLP provides a range of business benefits, including compliance support and intellectual property protection. The concept isn’t a new one, but the ability to put it to use in an easier, more viable manner is.
David Holmes's picture
After designating 2014 as “The Year of the Mega-Breach,” the security community hoped to bring awareness to the challenge of protecting customer data. As it turns out, the breaches of 2015 make the previous year’s ones pale in comparison.
Rafal Los's picture
How many devices are showing up at the office this week that are an always-on conduit to your network from some external third party you really shouldn’t be trusting?
David Holmes's picture
Ron Rivest, the inventor of RC4, has improved the RC4 algorithm by adding a third index variable k and moving i through the array more quickly. This new, improved RC4 is called Spritz.
Marc Solomon's picture
To ensure you understand and can address the main security challenges cloud apps can introduce to your organization, you need additional visibility and context.
Marc Solomon's picture
Retailers must adopt a threat-centric approach to security with protection along the full attack continuum – before, during, and after an attack.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.