Security Experts:

long dotted


Researchers uncover several potentially serious vulnerabilities in ManageEngine IT management products [Read More]
Intel plans on releasing CPUs with built-in protections against Meltdown and Spectre attacks later this year [Read More]
National Stores, which operates over 300 Fallas and other clothing stores across the U.S., admitted that hackers had access to its payment systems for five months [Read More]
Bell Canada informed customers that their information was illegally accessed. Names, email addresses and other data on 100,000 individuals compromised [Read More]
Seagate patches arbitrary file deletion and command injection vulnerabilities in Personal Cloud, and an XSS flaw in GoFlex [Read More]
A researcher discovered hundreds of misconfigured Jenkins servers that leaked sensitive information, including ones belonging to major companies [Read More]
Google has launched security center for G Suite, a tool designed to make it easier for administrators to manage an organization’s data security. [Read More]
Acer, Asus, Dell, Fujitsu, HP, IBM, Lenovo and other device manufacturers start releasing BIOS updates to patch Meltdown and Spectre CPU vulnerabilities [Read More]
Senators, Elizabeth Warren, D-Mass., and Mark Warner, D-Va, introduced a bill that would provide the Federal Trade Commission (FTC) with punitive powers over the credit reporting industry. [Read More]
Russia-linked hackers leaked private correspondence between International Olympic Committee officials in response to Russia being banned from the Pyeongchang 2018 Winter Games [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Travis Greene's picture
Whether US government officials improve their handling of classified information in the new administration or not, industry can certainty learn from the blunders and reduce risks.
Eddie Garcia's picture
To reduce the chances of falling victim to an insider-driven breach, security and risk professionals should start by learning what their available data can tell them.
Aditya Sood's picture
The cloud is here to stay, and so long as employees use cloud apps from within an organization’s firewall, we’ll always have to wrangle with Shadow IT, Shadow Data and the attendant problems and risks.
Steven Grossman's picture
Beginning November 30, 2016, DoD third party contractors will be required to establish and maintain an insider threat program.
Eddie Garcia's picture
This article explains how to encrypt data in a Hadoop cluster. The tools are available, and if you are brave enough, you could attempt this at home.
Eddie Garcia's picture
A common misconception about native HDFS encryption is the belief that the data is encrypted when written to disk on the data nodes like most disk encryption solutions.
Torsten George's picture
Google Dorking can be used to identify vulnerable systems and trace them to a specific place on the Internet.
Bill Sweeney's picture
Enterprises have to worry about the surface area that is open for attack and the challenge of detecting attacks quickly when they are occurring. In every instance simplification will help.
Wade Williamson's picture
Data science and machine learning models can assess large groups of cyber threats to find the subtle traits they have in common to better protect organizations.
Tim Layton's picture
The value of identifying your organization’s information out on the Dark Web can serve as a first-line indicator of a new breach that otherwise may go undetected for long periods of time.