Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Rumors circulating on hacker forums claim the controversial LeakedSource website was shut down following a law enforcement raid [Read More]
There were 4,149 data breaches reported during 2016, resulting in the total number of exposed records reaching 4.281 billion. [Read More]
OpenSSL has patched four low and moderate severity vulnerabilities, including DoS and carry propagation issues [Read More]
Western Digital patches remote command execution and authentication bypass vulnerabilities in My Cloud storage products [Read More]
Firefox 51 patches several critical vulnerabilities and warns users when a website that collects passwords doesn’t use HTTPS [Read More]
While the number of services affected by Heartbleed has dropped, Shodan has still found nearly 200,000 vulnerable devices [Read More]
Symantec revokes over 100 misissued certificates, including for domains such as example.com and test.com [Read More]
The number of data breaches disclosed in the United States increased by 40 percent in 2016 compared to the previous year, said ITRC and CyberScout [Read More]
Following a series of ransom attacks against MongoDB and Elasticsearch databases in recent weeks, many users of CouchDB and Hadoop are now finding their databases ar under attack as well. [Read More]
Unpatched vulnerabilities in the McDonald’s website expose user passwords to phishing attacks [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Tim Layton's picture
The value of identifying your organization’s information out on the Dark Web can serve as a first-line indicator of a new breach that otherwise may go undetected for long periods of time.
Johnnie Konstantas's picture
DLP provides a range of business benefits, including compliance support and intellectual property protection. The concept isn’t a new one, but the ability to put it to use in an easier, more viable manner is.
David Holmes's picture
After designating 2014 as “The Year of the Mega-Breach,” the security community hoped to bring awareness to the challenge of protecting customer data. As it turns out, the breaches of 2015 make the previous year’s ones pale in comparison.
Rafal Los's picture
How many devices are showing up at the office this week that are an always-on conduit to your network from some external third party you really shouldn’t be trusting?
David Holmes's picture
Ron Rivest, the inventor of RC4, has improved the RC4 algorithm by adding a third index variable k and moving i through the array more quickly. This new, improved RC4 is called Spritz.
Marc Solomon's picture
To ensure you understand and can address the main security challenges cloud apps can introduce to your organization, you need additional visibility and context.
Marc Solomon's picture
Retailers must adopt a threat-centric approach to security with protection along the full attack continuum – before, during, and after an attack.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.
Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.