Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A database containing over 5 billion records of data leaked in previous data breaches was exposed by a UK-based cybersecurity company. [Read More]
Researchers say a UK-based document printing and binding company leaked hundreds of gigabytes of information, including sensitive military documents, via an unprotected AWS server. [Read More]
NIST and DHS published a series of recommendations on how to ensure that virtual meetings and connections to enterprise networks are protected from prying eyes. [Read More]
Researchers say two connected financial services companies have exposed over 500,000 sensitive legal and financial documents. [Read More]
Firefox 74 brings several security improvements, including patches, a new add-ons policy, improved privacy, and versions 1.0 and 1.1 of the TLS protocol disabled by default. [Read More]
Australia's privacy watchdog announced legal action against Facebook Monday for alleged "systematic failures" exposing more than 300,000 Australians to a data breach by Cambridge Analytica. [Read More]
The cybersecurity company that discovered the details of 900,000 people in a Virgin Media database says the incident has been downplayed. [Read More]
UK telecommunications and media company Virgin Media has exposed the personal information of roughly 900,000 people. [Read More]
US lawmakers propose legislation that could see internet companies held legally responsible for content on their platforms if they don't do enough to police child pornography. [Read More]
The UK Information Commissioner's Office (ICO) has fined Hong Kong based Cathay Pacific Airways the maximum possible £500,000 ($646,000) following a long-running breach that occurred between October 2014 and May 2018. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Ellison Anne Williams's picture
Data in Use has become a point of least resistance for an attacker. There is a major industry need to recognize this lapse and close the gap in data security by protecting data while it is being used.
Gunter Ollmann's picture
DLP has always been tricky to deploy and enforce, and most CISOs can freely regale stories of DLP promises and their subsequent failures.
Ellison Anne Williams's picture
Data protection schemes must recognize and secure data as it exists at all points in the processing lifecycle, whether at rest, in transit, or in use.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Preston Hogue's picture
Security teams should think about how company data might connect with data from other organizations or industries and how those combined data sets could be triangulated into a larger picture that ultimately puts you at risk.
Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.