Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Apple users can now get a copy of the data the tech giant has on them, directly from a refreshed and expanded privacy website rolled out this week [Read More]
Google has packed the recently launched Pixel 3 and Pixel 3 XL devices with Titan M, a security chip that can better protect information at hardware level [Read More]
Tumblr has patched a vulnerability that could have been exploited to obtain user account information, including email addresses and protected passwords [Read More]
A new iPhone passcode bypass method that works on the latest version of iOS was disclosed just days after Apple patched a similar vulnerability [Read More]
The latest Android leverages Google Cloud’s Titan technology to better protect users’ backed-up application data [Read More]
Apple, Cisco, Mozilla, Kaspersky and others are concerned about Australia's encryption laws, despite the government specifically claiming it will not weaken encryption [Read More]
You might not have a choice if it's a service you use regularly. But for those you no longer use, consider a purge. Plus, it might feel good to get your online life in order, the way organizing a closet does. [Read More]
Industry professionals comment on recent Google+ security incident involving a bug that exposed personal information from 500,000 accounts [Read More]
Google was supposed to be focusing on its launch of a new smartphone and other devices, but the event was being overshadowed by a firestorm over a privacy glitch that forced it to shut down its struggling social network. [Read More]
Industry professionals comment on reports that China planted spy chips in Super Micro servers used by Amazon, Apple and many other organizations in the US [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Alastair Paterson's picture
What can U.S.-based companies do to prepare for the GDPR that is due to come into force in May 2018? These five steps can help.
Jennifer Blatnik's picture
Almost every industry can improve efficiencies with blockchain. But what will make blockchain a success is ultimately security.
Steven Grossman's picture
Organizations are increasingly combining UEBA technology with other data sources and analytics methods to overcome cyber risk challenges on a broader scale.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Erin O’Malley's picture
The CIA conducts extensive background investigations and requires polygraph examinations to gain a security clearance, yet a malicious insider apparently made off with a trove of secret CIA hacking tools.
Ashley Arbuckle's picture
The healthcare industry has a lot to gain by digital transformation. However it also has a lot to lose if it doesn’t start with security as a foundation.
Travis Greene's picture
Whether US government officials improve their handling of classified information in the new administration or not, industry can certainty learn from the blunders and reduce risks.
Eddie Garcia's picture
To reduce the chances of falling victim to an insider-driven breach, security and risk professionals should start by learning what their available data can tell them.
Aditya Sood's picture
The cloud is here to stay, and so long as employees use cloud apps from within an organization’s firewall, we’ll always have to wrangle with Shadow IT, Shadow Data and the attendant problems and risks.
Steven Grossman's picture
Beginning November 30, 2016, DoD third party contractors will be required to establish and maintain an insider threat program.