Security Experts:

long dotted


Data security start-up firm Enveil has launched the first practical and scalable commercial homomorphic encryption platform, ZeroReveal. [Read More]
Facebook notifies 800,000 users that people they had blocked were temporarily unblocked due to a bug. The company also detailed new API restrictions designed to protect user information [Read More]
Typeform, a Spain-based SaaS company that specializes in online forms and surveys, suffered a breach that resulted in the data collected by many organizations getting stolen [Read More]
Roughly 340 million records (230 million on consumers and 110 million on business contacts) may have been exposed by data broker Exactis. [Read More]
Facebook and Google are pushing users to share private information by offering "invasive" and limited default options despite new EU data protection laws aimed at giving users more control and choice [Read More]
Ticketmaster UK blamed JavaScript code customized by third party firm Inbenta for a breach that resulted in thousands of personal customer information being compromised. [Read More]
Hundreds of hotels had customer data stolen as a result of a breach suffered by Fastbooking, a France-based company that provides e-commerce solutions for the hotel industry [Read More]
Vulnerabilities in Sophos SafeGuard products allow attackers to escalate privileges and execute code with SYSTEM permissions [Read More]
BigID, a company that specializes in helping enterprises secure customer data and complying with regulations like GDPR, raises $30 million in a series B funding round [Read More]
Quantum Xchange has raised $10 Million in Series A funding and has launched the first commercial quantum key distribution (QKD) service in the U.S. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Steven Grossman's picture
Organizations are increasingly combining UEBA technology with other data sources and analytics methods to overcome cyber risk challenges on a broader scale.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Erin O’Malley's picture
The CIA conducts extensive background investigations and requires polygraph examinations to gain a security clearance, yet a malicious insider apparently made off with a trove of secret CIA hacking tools.
Ashley Arbuckle's picture
The healthcare industry has a lot to gain by digital transformation. However it also has a lot to lose if it doesn’t start with security as a foundation.
Travis Greene's picture
Whether US government officials improve their handling of classified information in the new administration or not, industry can certainty learn from the blunders and reduce risks.
Eddie Garcia's picture
To reduce the chances of falling victim to an insider-driven breach, security and risk professionals should start by learning what their available data can tell them.
Aditya Sood's picture
The cloud is here to stay, and so long as employees use cloud apps from within an organization’s firewall, we’ll always have to wrangle with Shadow IT, Shadow Data and the attendant problems and risks.
Steven Grossman's picture
Beginning November 30, 2016, DoD third party contractors will be required to establish and maintain an insider threat program.
Eddie Garcia's picture
This article explains how to encrypt data in a Hadoop cluster. The tools are available, and if you are brave enough, you could attempt this at home.
Eddie Garcia's picture
A common misconception about native HDFS encryption is the belief that the data is encrypted when written to disk on the data nodes like most disk encryption solutions.