Security Experts:

long dotted


A researcher has found an openly accessible database storing the details of 198,000 people who had used a now-defunct iPhone app [Read More]
Google starts tracking the state of HTTPS on the top 100 third-party websites in an effort to monitor the progress of encryption efforts [Read More]
After significant backlash, Amazon has changed its stance on full disk encryption for its Kindle Fire devices, and will bring back the data protection measure in the near future. [Read More]
Amazon has killed support for encryption on Kindle Fire devices and quietly removed it from Fire HD and Fire HDX 8.9 devices with the release of Fire OS 5 in February. [Read More]
DLP for Gmail now includes Optical Character Recognition (OCR) for improved attachment scanning, a new set of predefined content detectors, and increased control over content detection thresholds. [Read More]
Apple on Thursday urged a federal court to toss out an order that the company help the FBI hack into an iPhone used by a shooter in the San Bernardino attack, arguing that it was a "dangerous power." [Read More]
Last year, 1,673 data breaches resulted in roughly 707 million data records being compromised worldwide, according to statistics from Gemalto’s Breach Level Index report. [Read More]
Illumio's Adaptive User Segmentation dynamically calculates and provisions connectivity rules based on user identity to prevent unauthorized communications and access to applications. [Read More]
Vera, a Palo Alto, Calif.-based data protection startup, has closed a $17 million Series B funding round, led by Sutter Hill Ventures, bringing the total amount raised by the company to more than $31 million. [Read More]
DB Networks has launched a new Layer 7 Database Sensor to provide original equipment manufacturers (OEMs) with advanced database security capabilities. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.
Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.
Wade Williamson's picture
Personally Identifiable Information (PII) can provide invaluable human intelligence to nation-state attackers who are often behind the most sophisticated attacks.
Travis Greene's picture
Does it really matter if someone steals your healthcare records? What would a hacker do with that information? Sell it? To whom and for what purpose?
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Wade Williamson's picture
In light of the seemingly endless parade of high-profile breaches, it’s easy to focus on external threats, while losing sight of insider threats.
Mark Hatton's picture
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.
Marc Solomon's picture
Just as they’ve embraced other technology innovations to advance their businesses, midsized organizations need a new approach to cybersecurity that mitigates risk to valuable digital assets.
Wade Williamson's picture
By establishing an enterprise-wide context focused on key assets and user behaviors, organizations can build a unified security framework that encompasses all locations and all of their assets.
Eddie Garcia's picture
Eddie Garcia explains how to grant user permissions to a subset of data in Hadoop and limit the type of operations the user is allowed to perform.