Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

LinkedIn patches AutoFill vulnerability that could have been exploited to harvest data from users’ profiles [Read More]
48 million records containing detailed personal information of tens of millions of people were exposed to the Internet after data-gathering company LocalBlox left a cloud storage repository publicly available. [Read More]
Cloudflare launches Spectrum, a new service designed to extend the company’s DDoS and other protections to gaming, remote access, email and other services [Read More]
The 2016 data breach that Uber made public in November 2017 impacted over 25 million riders and drivers in the United States, the Federal Trade Commission (FTC) reveals. [Read More]
PowerHammer attack allows hackers to stealthily exfiltrate data from air-gapped computers using power lines [Read More]
Mark Zuckerberg will appear before US lawmakers as a firestorm rocks Facebook over its data privacy scandal, with pressure mounting for new regulations on social media platforms. [Read More]
Best Buy customers may have had their payment card data stolen as a result of the breach suffered by online services provider [24]7.ai. [Read More]
Some 1.5 billion sensitive online files, from pay stubs to medical scans to patent applications, are visible on the open internet, cybersecurity firm Digital Shadows said. [Read More]
AWS launches new tools designed to help users manage firewalls, provision private certificates, and safely store and distribute credentials and other secrets [Read More]
The Varonis 2018 Global Data Risk Report contains the findings of 130 corporate risk analyses conducted during 2017, which examined more than 6 billion individual files from 30 different industries across more than 50 countries. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Alastair Paterson's picture
While a boon to productivity, some of the most ubiquitous file sharing services across the Internet are also at the heart of a global problem – publicly exposed data.
Jim Ivers's picture
More vulnerabilities create more attacks; more attacks breed additional fatigue. So how can we wake up and fix the problems creating such a widespread headache?
Justin Fier's picture
When we look at this cycle of stealthy and silent data breaches, we have to ask ourselves: how can such tremendous amounts of data leave our corporate networks without raising any alarms?
Joshua Goldfarb's picture
Many organizations seem to focus almost entirely on technological solutions to tactical problems, rather than on strategically addressing how they can best and most efficiently protect data.
Lance Cottrell's picture
Passive Information Leakage (PIL) is one of the least known and most difficult forms of data lost to prevent, and is little understood, primarily because it cannot be addressed through conventional security practices.
Steven Grossman's picture
The challenge of data protection is not going away. Even without the ever-improving tactics of the bad guys, data sprawl has made it difficult for those just trying to do their jobs.
Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.
Alastair Paterson's picture
What can U.S.-based companies do to prepare for the GDPR that is due to come into force in May 2018? These five steps can help.
Jennifer Blatnik's picture
Almost every industry can improve efficiencies with blockchain. But what will make blockchain a success is ultimately security.
Steven Grossman's picture
Organizations are increasingly combining UEBA technology with other data sources and analytics methods to overcome cyber risk challenges on a broader scale.