Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

User credentials, personally identifiable information, and other types of data belonging to United Nations Environment Programme employees exposed. [Read More]
Encrypted Client Hello (ECH) aims to address the shortcomings of Encrypted Server Name Indication (ESNI). [Read More]
An investigation has been launched into the impact of the SolarWinds breach on U.S. federal courts, which reportedly were considered a target of interest by the hackers. [Read More]
Red Hat buys an innovative container security startup and announced plans to open-source the technology at a later date. [Read More]
NSA urges NSS, DoD, and DIB network owners to enhance their cybersecurity posture. [Read More]
Singapore has admitted data collected for contact-tracing can be accessed by police despite earlier assurances it would only be used to fight the coronavirus, sparking privacy concerns about the scheme. [Read More]
The combined entity offers more than a half-dozen security solutions for data security risk detection and cyber-attack protection, response, and recovery. [Read More]
GDPR fines exceeded €170 million ($200 million) in 2020, with Italy, the UK and Germany accounting for the highest total fines. [Read More]
HelpSystems, a Minneapolis, Minnesota-based software company, has acquired cloud-based data protection solution provider Vera for an undisclosed amount. [Read More]
The ACLU has filed a lawsuit against the FBI in an effort to find out how the agency is breaking into encrypted devices. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Preston Hogue's picture
Security teams should think about how company data might connect with data from other organizations or industries and how those combined data sets could be triangulated into a larger picture that ultimately puts you at risk.
Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.
Alastair Paterson's picture
While a boon to productivity, some of the most ubiquitous file sharing services across the Internet are also at the heart of a global problem – publicly exposed data.
Jim Ivers's picture
More vulnerabilities create more attacks; more attacks breed additional fatigue. So how can we wake up and fix the problems creating such a widespread headache?
Justin Fier's picture
When we look at this cycle of stealthy and silent data breaches, we have to ask ourselves: how can such tremendous amounts of data leave our corporate networks without raising any alarms?
Joshua Goldfarb's picture
Many organizations seem to focus almost entirely on technological solutions to tactical problems, rather than on strategically addressing how they can best and most efficiently protect data.
Lance Cottrell's picture
Passive Information Leakage (PIL) is one of the least known and most difficult forms of data lost to prevent, and is little understood, primarily because it cannot be addressed through conventional security practices.
Steven Grossman's picture
The challenge of data protection is not going away. Even without the ever-improving tactics of the bad guys, data sprawl has made it difficult for those just trying to do their jobs.