Security Experts:

long dotted


Israeli data classification startup DocAuthority has raised $10 million in a Series A funding round led by Raine Ventures. [Read More]
Austin, Texas-based ALTR emerged from stealth mode on Wednesday with a blockchain-based data security solution and $15 million in funding [Read More]
DNA and genealogy firm MyHeritage announces that the access credentials of 92 million users have been stolen. Will Europe decide to make a high-profile example of MyHeritage early into the GDPR age? [Read More]
Several major organizations hit by data breach at PageUp, an Australian HR software firm whose platform is used around the world [Read More]
The data of more than 26 million users was compromised in the recent Ticketfly hack. Some services restored after five days [Read More]
Google warns G Suite users after researchers find thousands of organizations exposing sensitive data through misconfigured Google Groups instances [Read More]
Researchers discover vulnerabilities in ten WordPress plugins made by Multidots for WooCommerce e-commerce websites. WordPress disabled many of them after the developer failed to release patches [Read More]
Ticketfly shuts down website after it was defaced by a hacker. The attacker also obtained personal information on Ticketfly customers [Read More]
Two major Canadian banks launch an investigation after hackers claim to have obtained customer information as a result of a data breach [Read More]
The difficulty with the email problem is that it doesn't lend itself to a traditional rules-based solution -- email is used too frequently, too easily, with too many subjects and to too many people. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.
Alastair Paterson's picture
While a boon to productivity, some of the most ubiquitous file sharing services across the Internet are also at the heart of a global problem – publicly exposed data.
Jim Ivers's picture
More vulnerabilities create more attacks; more attacks breed additional fatigue. So how can we wake up and fix the problems creating such a widespread headache?
Justin Fier's picture
When we look at this cycle of stealthy and silent data breaches, we have to ask ourselves: how can such tremendous amounts of data leave our corporate networks without raising any alarms?
Joshua Goldfarb's picture
Many organizations seem to focus almost entirely on technological solutions to tactical problems, rather than on strategically addressing how they can best and most efficiently protect data.
Lance Cottrell's picture
Passive Information Leakage (PIL) is one of the least known and most difficult forms of data lost to prevent, and is little understood, primarily because it cannot be addressed through conventional security practices.
Steven Grossman's picture
The challenge of data protection is not going away. Even without the ever-improving tactics of the bad guys, data sprawl has made it difficult for those just trying to do their jobs.
Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.
Alastair Paterson's picture
What can U.S.-based companies do to prepare for the GDPR that is due to come into force in May 2018? These five steps can help.
Jennifer Blatnik's picture
Almost every industry can improve efficiencies with blockchain. But what will make blockchain a success is ultimately security.