Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researcher earns $13,337 from Google after finding a serious SSRF vulnerability on its internal network that may have exposed sensitive information [Read More]
State-actors were likely behind Singapore's biggest ever cyberattack to date, security experts say, citing the scale and sophistication of the hack which hit medical data of about a quarter of the population [Read More]
A publicly accessible Amazon Web Services S3 bucket belonging to political autodial firm Robocent was exposing hundreds of thousands of United States voter records. [Read More]
Timehop has shared more details on the recent data breach, including what the hacker did on its systems and what other type of information was compromised [Read More]
Britain's Information Commissioner's Office (ICO) plans to issue Facebook with the maximum available fine for breaches of the Data Protection Act -- an equivalent of $660,000 or 566,000 euros. [Read More]
An ex-Apple engineer was charged with stealing secrets from a hush-hush self-driving car technology project days before he quit to go to a Chinese startup. [Read More]
Analysis suggests the recent Ticketmaster breach was bigger and over a longer period than previously thought -- but it is only one part of a much larger and ongoing campaign to steal users' payment details. [Read More]
German web hosting firm DomainFactory shuts down forum following data breach. Hacker gained access to sensitive data, including banking information [Read More]
Hackers gained access to Timehop systems in December 2017, but the breach was only discovered on July 4. The incident affects 21 million users [Read More]
Facebook confirms facing multiple inquiries from US and British regulators about the major Cambridge Analytica user data scandal [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.
Alastair Paterson's picture
While a boon to productivity, some of the most ubiquitous file sharing services across the Internet are also at the heart of a global problem – publicly exposed data.
Jim Ivers's picture
More vulnerabilities create more attacks; more attacks breed additional fatigue. So how can we wake up and fix the problems creating such a widespread headache?
Justin Fier's picture
When we look at this cycle of stealthy and silent data breaches, we have to ask ourselves: how can such tremendous amounts of data leave our corporate networks without raising any alarms?
Joshua Goldfarb's picture
Many organizations seem to focus almost entirely on technological solutions to tactical problems, rather than on strategically addressing how they can best and most efficiently protect data.
Lance Cottrell's picture
Passive Information Leakage (PIL) is one of the least known and most difficult forms of data lost to prevent, and is little understood, primarily because it cannot be addressed through conventional security practices.
Steven Grossman's picture
The challenge of data protection is not going away. Even without the ever-improving tactics of the bad guys, data sprawl has made it difficult for those just trying to do their jobs.
Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.
Alastair Paterson's picture
What can U.S.-based companies do to prepare for the GDPR that is due to come into force in May 2018? These five steps can help.
Jennifer Blatnik's picture
Almost every industry can improve efficiencies with blockchain. But what will make blockchain a success is ultimately security.