Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Hundreds of Internet-accessible, unprotected medical imaging systems expose data on millions of patients worldwide, a cybersecurity firm has discovered. [Read More]
P&N Bank has notifed customers of a data breach that resulted in a large amount of sensitive information being compromised. [Read More]
Dating apps Grindr, OkCupid and Tinder leak personal information to advertising companies in possible violation of European data privacy laws, a consumer group said in a report. [Read More]
The FBI asked Apple to help extract data from iPhones that belonged to the Saudi aviation student Mohammed Alshamrani, who fatally shot three sailors at a U.S. naval base in Florida. [Read More]
Facebook, Samsung and Ring have unveiled new or improved privacy and security tools at CES 2020. [Read More]
Firefox 72 will provide users with an option to delete telemetry data in response to California’s Consumer Privacy Act (CCPA), Mozilla says. [Read More]
An unprotected database exposed the data of all Wyze users who created an account before December 26, 2019. [Read More]
ProtonMail releases beta version of ProtonCalendar, a fully encrypted calendar application that aims to help users keep track of their plans and keep their data private. [Read More]
Brazil fines Facebook $1.65 million for improperly sharing users' data in a case linked to the global Cambridge Analytica scandal. [Read More]
OpenSSL has evolved a great deal in terms of security since the disclosure of the Heartbleed vulnerability back in 2014. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Ellison Anne Williams's picture
Data in Use has become a point of least resistance for an attacker. There is a major industry need to recognize this lapse and close the gap in data security by protecting data while it is being used.
Gunter Ollmann's picture
DLP has always been tricky to deploy and enforce, and most CISOs can freely regale stories of DLP promises and their subsequent failures.
Ellison Anne Williams's picture
Data protection schemes must recognize and secure data as it exists at all points in the processing lifecycle, whether at rest, in transit, or in use.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Preston Hogue's picture
Security teams should think about how company data might connect with data from other organizations or industries and how those combined data sets could be triangulated into a larger picture that ultimately puts you at risk.
Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.