Security Experts:

long dotted


Hackers stole nearly 100 million accounts from the popular Russian web portal Rambler [Read More]
Hackers breached the systems of Canada-based PoS software provider Lightspeed and accessed customer information [Read More]
The details of 43 million users were stolen in the data breach suffered by the company back in 2012 [Read More]
Identity management firm OneLogin suffers data breach. Attackers may have accessed sensitive user data exposed due to a logging flaw [Read More]
Researchers show how an unmodified USB device can be used as an RF transmitter to steal data from air-gapped computers [Read More]
The FBI has issued an alert detailing the methods used by malicious actors in attacks aimed at the election systems of two U.S. states [Read More]
Attackers may have gained access to Opera Sync usernames and passwords after breaching one of the company’s servers [Read More]
Hackers have stolen 25 million user accounts from Mail.Ru domains, but the Internet company says the compromised credentials are invalid [Read More]
Epic Games has shut down its forums after hackers gained access to information associated with over 800,000 accounts [Read More]
A critical security vulnerability that has been around for 18 years has been patched in GnuPG and Libgcrypt [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Marc Solomon's picture
To ensure you understand and can address the main security challenges cloud apps can introduce to your organization, you need additional visibility and context.
Marc Solomon's picture
Retailers must adopt a threat-centric approach to security with protection along the full attack continuum – before, during, and after an attack.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.
Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.
Wade Williamson's picture
Personally Identifiable Information (PII) can provide invaluable human intelligence to nation-state attackers who are often behind the most sophisticated attacks.
Travis Greene's picture
Does it really matter if someone steals your healthcare records? What would a hacker do with that information? Sell it? To whom and for what purpose?
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Wade Williamson's picture
In light of the seemingly endless parade of high-profile breaches, it’s easy to focus on external threats, while losing sight of insider threats.
Mark Hatton's picture
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.