Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Mocana has released what it calls a highly secure drop-in replacement for the widely adopted OpenSSL stack for Apache Web servers.
Bitglass, a Silicon Valley-based provider of enterprise data protection solutions, has secured $25 million in Series B funding.
According to a recent the study, 99% of the most popular free Android and iOS apps exhibit at least one type of behavior that poses a security or privacy threat to organizations.
Mozilla warned that it mistakenly exposed information on almost 80,000 members of its Mozilla Developer Network (MDN) as a result of a botched data sanitization process.
A global survey conducted by data protection solutions provider SafeNet once again confirms that data breaches, especially ones that involve financial data, have a negative impact on customer loyalty.
Secure embedded L4 (seL4), said to be the world's most highly-assured operating system, has been released as open source.
UK Travel Company W3 Limited was fined £150,000 for violating the Data Protection Act after hackers stole details of 1.1 Million payment cards.
Information security specialists at the Georgia Tech Research Institute have developed BlackForest, a new open source intelligence gathering system.
Comodo SecureBox is designed to help organizations protect the important applications running on their endpoints.
Many software development firms still fail to ensure that the components they use don't contain security vulnerabilities, according to a report published by software supply chain management company Sonatype.

FEATURES, INSIGHTS // Data Protection

rss icon

Mark Hatton's picture
The oversight for the protection of healthcare information is only getting tighter, and it is incumbent upon the security teams to ensure healthcare professionals have all the tools necessary to improve patient outcomes, while we worry about keeping the bad guys away.
Wade Williamson's picture
If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.
Jon-Louis Heimerl's picture
The concepts of defense in depth have been with us for years -- hundreds of years, if not thousands. Maybe we can learn something from those architects of warfare from the Middle Ages?
Michael Callahan's picture
While I’d argue the point that the chip and PIN system is better and more secure than the mag stripe, it’s not what caused these or what will prevent future malware attacks.
Torsten George's picture
While security monitoring generates big data, in its raw form it remains only a means to an end. Ultimately, information security decision making should be based on prioritized, actionable insight derived from the data.
Mike Tierney's picture
The insider threat is very much a reality, and because it hides in the details, it’s one of the biggest threats businesses can encounter.
Gil Zimmermann's picture
IT managers focused on protecting technology infrastructure would do well to assess whether cloud service providers have better security systems in place than their own corporate IT resources allow.
Dr. Mike Lloyd's picture
Every security team that can fog a mirror is asking the question “what just happened at Target, and how do we make sure that doesn’t happen to us?”
Michael Callahan's picture
The threats that companies face will continue to accelerate. And while that might seem like a very obvious and not so insightful observation, the devil is in the details. Here are the trends both in the threats and how we will respond to them in 2014.
Nimmy Reichenberg's picture
With the release of PCI-DSS 3.0, organizations have a framework for payment security as part of their business-as-usual activities by introducing more flexibility, and an increased focus on education, awareness and security as a shared responsibility.