Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Hackers have stolen 25 million user accounts from Mail.Ru domains, but the Internet company says the compromised credentials are invalid [Read More]
Epic Games has shut down its forums after hackers gained access to information associated with over 800,000 accounts [Read More]
A critical security vulnerability that has been around for 18 years has been patched in GnuPG and Libgcrypt [Read More]
Social Blade hacked. Details of more than 270,000 users, including passwords, leaked online [Read More]
Researchers detail DiskFiltration, a method that allows hackers to steal data from air-gapped computers using hard drive noise [Read More]
Notorious cybercriminal selling account credentials of 200 million Yahoo users. Yahoo has yet to confirm the validity of the data [Read More]
Proxy attacks that work on most browsers and operating systems can be leveraged for phishing, information theft and DoS attacks [Read More]
A flaw in the Silk browser running on Amazon Kindle allowed hackers to intercept Google search traffic [Read More]
A new cyber espionage group called Dropping Elephant achieves a high success rate with only low tech attacks. [Read More]
Most businesses lack insight into the actual value of critical data assets that are targeted by cybercriminals, a recent report reveals. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Marc Solomon's picture
To ensure you understand and can address the main security challenges cloud apps can introduce to your organization, you need additional visibility and context.
Marc Solomon's picture
Retailers must adopt a threat-centric approach to security with protection along the full attack continuum – before, during, and after an attack.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.
Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.
Wade Williamson's picture
Personally Identifiable Information (PII) can provide invaluable human intelligence to nation-state attackers who are often behind the most sophisticated attacks.
Travis Greene's picture
Does it really matter if someone steals your healthcare records? What would a hacker do with that information? Sell it? To whom and for what purpose?
Alan Cohen's picture
Today’s network perimeter is increasingly not a single physical or virtual place, yet much of the industry debate is still focused on the perimeter.
Wade Williamson's picture
In light of the seemingly endless parade of high-profile breaches, it’s easy to focus on external threats, while losing sight of insider threats.
Mark Hatton's picture
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.