Security Experts:

long dotted


Researcher discovers publicly accessible database containing 93 million records associated with Mexican voters [Read More]
A draft of an encryption bill proposed by U.S. senators has been heavily criticized by experts who say it’s flawed and dangerous [Read More]
Experts comment on implications of Panama Papers incident and how such breaches can be avoided [Read More]
A report has claimed that there are vulnerabilities in the US Consular Consolidated Database (CCD) that contains personal details from everyone who has applied for a US visa over the past twenty years. [Read More]
A massive data leak from Panama Law Firm Mossack contains 2.6 terabytes of data, including 4.8 million emails, 2.2 million PDFs, and millions more images and text documents. [Read More]
Data protection startup Vera has launched its new cloud-based Information Rights Management (IRM) platform. [Read More]
The personal details of thousands of foreign nationals living in southern Thailand were briefly leaked online in what the site's developer admitted was a data breach during a test for police. [Read More]
A survey conducted among IT security pros at US federal agencies shows that most of them feel their organization is vulnerable to data threats [Read More]
Updates released by Apple for iOS and OS X patch serious flaws that can be exploited to decrypt content sent via iMessage [Read More]
Vulnerability in Apple’s iMessage application allows hackers to access encrypted photos and videos [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.
Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.
Wade Williamson's picture
Personally Identifiable Information (PII) can provide invaluable human intelligence to nation-state attackers who are often behind the most sophisticated attacks.
Travis Greene's picture
Does it really matter if someone steals your healthcare records? What would a hacker do with that information? Sell it? To whom and for what purpose?
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Wade Williamson's picture
In light of the seemingly endless parade of high-profile breaches, it’s easy to focus on external threats, while losing sight of insider threats.
Mark Hatton's picture
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.
Marc Solomon's picture
Just as they’ve embraced other technology innovations to advance their businesses, midsized organizations need a new approach to cybersecurity that mitigates risk to valuable digital assets.
Wade Williamson's picture
By establishing an enterprise-wide context focused on key assets and user behaviors, organizations can build a unified security framework that encompasses all locations and all of their assets.