Security Experts:

Privacy & Compliance
long dotted

NEWS & INDUSTRY UPDATES

OpenSSH 9.0 has been fitted with new defaults to prevent "capture now, decrypt later" attacks linked to advancements in quantum computing. [Read More]
Private equity firm Thoma Bravo pushes deeper into cybersecurity market with a $6.9 billion deal to acquire identity and access management powerhouse SailPoint Technologies. [Read More]
Nudge Security, an early stage startup promising to help organizations manage cybersecurity decisions, has emerged from stealth with a $7 million seed round. [Read More]
Lithuania-based Nord Security has raised $100 million in its first ever outside capital funding, which values the company at $1.6 billion. [Read More]
Apple is being called to task for neglecting to patch two "actively exploited" zero-day vulnerabilities on older versions of its flagship macOS platform. [Read More]
A Chinese threat actor known as Cicada (APT10, Stone Panda) has expanded its target list to include government, legal, religious, and non-governmental organizations (NGOs) in multiple countries around the world. [Read More]
CashApp said the stolen data includes brokerage account numbers, full names, brokerage portfolio values, and brokerage portfolio holdings for one trading day. [Read More]
Four months since the Log4j issue exploded onto the internet, all the major affected vendors have released patches – but even where companies have patched, security experts warn it's a mistake to relax. [Read More]
PCI Data Security Standard (DSS) v4.0 released to address emerging threats to customer payment information. [Read More]
Apple’s security response team on Thursday released emergency patches to cover a pair of “actively exploited” vulnerabilities affecting macOS, iOS and iPadOS devices. [Read More]

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Lance Cottrell's picture
Facial recognition systems are becoming cheaper, better, easier to use, and more widely deployed, while social media platforms are creating an ocean of easily identifiable faces that are widely accessible.
Ashley Arbuckle's picture
Penalties for non-compliance with GDPR will be severe. For example, if your organization fails to report a data breach within 72 hours, expect a fine.
Jalal Bouhdada's picture
Jalal Bouhdada, Founder and Principal ICS Security Consultant at Applied Risk, discusses the implications of the new EU Directive on Security of Network and Information Systems (NIS)
Steven Grossman's picture
How can a company protect its information and operations without running askew of data privacy laws and the concerns of its customers?
Alastair Paterson's picture
What can U.S.-based companies do to prepare for the GDPR that is due to come into force in May 2018? These five steps can help.
Jennifer Blatnik's picture
Protecting this data is a necessity as more and more consumers are voluntarily offering up their rights to security or privacy in search for convenience.
Steven Grossman's picture
Why do we seem to need layer upon layer of regulation and guidance to try to ensure a more secure business world? Is it working?
Lance Cottrell's picture
By surreptitiously monitoring and engaging with potential attackers and malware developers you can successfully gain information about emerging attack methods, patterns, and practices in the cyber underground.
Jim Ivers's picture
With the advent of connected devices, privacy and security have become tightly linked because theft of private data is often the goal of malicious attacks.
Jim Ivers's picture
Enlightened toy manufacturers likely begin to embrace the basic concepts of IoT security and build connected toys that can be trusted by parents.