Security Experts:

long dotted


A little over half of United States-based IT leaders and a third United Kingdom-based leaders believe it would be "easy" for an ex-employee to log in and access systems or information with old passwords.
A group of computer code experts said Tuesday that law enforcement cannot be given special access to encrypted communications without opening the door to "malicious" actors.
Cryptzone, a Waltham, Mass-based provider of application and content security solutions, has closed a $15 million Series B round of funding.
While container adoption is likely to surge over the next few years, concerns around security, certification and adequate skills remain, according to a recent survey commissioned by Red Hat.
Wikipedia will use HTTPS for all traffic to ensure users' safety and privacy. The transition will be completed within two weeks, says the Wikimedia Foundation.
Visa and FireEye announced plans to co-develop tools and services to help merchants and issuers protect against advanced cyber attacks targeting payment data.
By deploying Adallom with Dropbox for Business, customers will gain visibility into and control over company data shared and stored within Dropbox.
Bitdefender has unveiled a new technology designed to secure virtualized environments through hypervisor-level inspection.
Two memory corruption vulnerabilities (CVE-2015-2282, CVE-2015-2278) were found in the compression libraries used by almost all SAP Netweaver products
The security industry comments on the latest Verizon Data Breach Investigations Report (DBIR).

FEATURES, INSIGHTS // Data Protection

rss icon

Mark Hatton's picture
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.
Marc Solomon's picture
Just as they’ve embraced other technology innovations to advance their businesses, midsized organizations need a new approach to cybersecurity that mitigates risk to valuable digital assets.
Wade Williamson's picture
By establishing an enterprise-wide context focused on key assets and user behaviors, organizations can build a unified security framework that encompasses all locations and all of their assets.
Eddie Garcia's picture
Eddie Garcia explains how to grant user permissions to a subset of data in Hadoop and limit the type of operations the user is allowed to perform.
Torsten George's picture
Massive data breaches are raising doubts about whether organizations are investing their security dollars in the right areas.
Danelle Au's picture
A data breach plan lays out the key steps and the key personnel to involve when a data breach happens, and needs to incorporate three elements.
Travis Greene's picture
The combination of access governance and self-service access request and approval provides the best approach to strike back at the access clones.
Danelle Au's picture
When it comes to SaaS applications versus on-premise, there are three characteristics that define the need for a different approach to data governance, risk management and security in the cloud.
David Maman's picture
Through simple planning and forethought, organizations can ensure their databases not only meet compliance requirements, but will remain secure.
David Maman's picture
Moving sensitive data into the hands of third-party cloud providers expands and complicates the risk landscape in which companies operate every day.