Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Equifax confirms that an Apache Struts vulnerability exploited in the wild since March has been used to breach its systems [Read More]
Industry professionals comment on the Equifax hack, which may affect as many as 143 million people [Read More]
Equifax said hackers accessed its system in a colossal breach that could affect nearly half the US population as well as people in Britain and Canada. [Read More]
Lenovo settles FTC charges over the Superfish adware shipped with many of its laptops, but the company will not pay a fine [Read More]
Hackers are selling phone numbers and email addresses of millions of celebrities and other high profile Instagram users [Read More]
Siemens releases patches for vulnerabilities affecting automation and power distribution products [Read More]
Details of thousands of U.S. military veterans and law enforcement officers looking for a job at an international security firm leaked online via unprotected AWS storage [Read More]
WikiLeaks exposes tool used by CIA to secretly collect biometric data from the agency’s liaison services [Read More]
Snapchat awards researchers a total of $20,000 for finding exposed Jenkins instances that allowed arbitrary code execution [Read More]
Russia-linked Fancy Bear hackers leak emails and medical records on football (soccer) players caught using illegal substances [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Jennifer Blatnik's picture
Almost every industry can improve efficiencies with blockchain. But what will make blockchain a success is ultimately security.
Steven Grossman's picture
Organizations are increasingly combining UEBA technology with other data sources and analytics methods to overcome cyber risk challenges on a broader scale.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Erin O’Malley's picture
The CIA conducts extensive background investigations and requires polygraph examinations to gain a security clearance, yet a malicious insider apparently made off with a trove of secret CIA hacking tools.
Ashley Arbuckle's picture
The healthcare industry has a lot to gain by digital transformation. However it also has a lot to lose if it doesn’t start with security as a foundation.
Travis Greene's picture
Whether US government officials improve their handling of classified information in the new administration or not, industry can certainty learn from the blunders and reduce risks.
Eddie Garcia's picture
To reduce the chances of falling victim to an insider-driven breach, security and risk professionals should start by learning what their available data can tell them.
Aditya Sood's picture
The cloud is here to stay, and so long as employees use cloud apps from within an organization’s firewall, we’ll always have to wrangle with Shadow IT, Shadow Data and the attendant problems and risks.
Steven Grossman's picture
Beginning November 30, 2016, DoD third party contractors will be required to establish and maintain an insider threat program.
Eddie Garcia's picture
This article explains how to encrypt data in a Hadoop cluster. The tools are available, and if you are brave enough, you could attempt this at home.