Security Experts:

long dotted


Microsoft Azure Information Protection it combines the Azure Rights Management System (RMS) with the data classification and labeling technology acquired with the purchase of Secure Islands in November 2015. [Read More]
A hacker had accessed the video conferencing system of the Parti Libéral du Québec (PLQ) and eavesdropped on confidential meetings. [Read More]
Banking giant Morgan Stanley will pay $1 million as penalty for failure to protect customer information on roughly 730,000 clients, the Securities and exchange Commission (SEC) said Wednesday. [Read More]
RansomWeb attacks are on the rise and attackers have plenty of vulnerabilities they can exploit to hack website databases [Read More]
Researchers find several SQL injection vulnerabilities in the websites of the European Parliament and the European Commission [Read More]
Egnyte Protect provides access control and can be used to eliminate insecure links, unify permissions across content repositories, and to locate unusual access patterns to help locate and limit data leakage. [Read More]
A researcher claims to have found an unprotected database belonging to a major California electric utility [Read More]
The data breach disclosed by Tumblr in May affected over 65 million users who registered accounts up until early 2013 [Read More]
Researchers have devised what they believe to be a perfect exfiltration technique for small amounts of data [Read More]
A WPAD protocol vulnerability can be exploited by malicious actors for MitM attacks over the Internet [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Marc Solomon's picture
To ensure you understand and can address the main security challenges cloud apps can introduce to your organization, you need additional visibility and context.
Marc Solomon's picture
Retailers must adopt a threat-centric approach to security with protection along the full attack continuum – before, during, and after an attack.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.
Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.
Wade Williamson's picture
Personally Identifiable Information (PII) can provide invaluable human intelligence to nation-state attackers who are often behind the most sophisticated attacks.
Travis Greene's picture
Does it really matter if someone steals your healthcare records? What would a hacker do with that information? Sell it? To whom and for what purpose?
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Wade Williamson's picture
In light of the seemingly endless parade of high-profile breaches, it’s easy to focus on external threats, while losing sight of insider threats.
Mark Hatton's picture
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.