Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Researchers disclose NetCAT, a new side-channel attack method that can be exploited to steal sensitive data from remote servers powered by Intel CPUs with DDIO technology. [Read More]
South Korean-based industrial manufacturer DK-LOK was found to leak internal and external communications, including customer data. [Read More]
Data protection firm BigID raises $50 million in a Series C funding round, which brings the total raised by the company to nearly $100 million. [Read More]
Phone numbers linked to more than 400 million Facebook accounts were reportedly found online, but the social media giant believes the actual number of impacted accounts is roughly half of that. [Read More]
Google agreed Wednesday to pay $170 million to settle charges that it illegally collected and shared data from children on its YouTube video service, a deal critics said was too soft on the internet giant. [Read More]
The XKCD forum has been taken offline after suffering a data breach that impacted 562,000 users. [Read More]
Imperva learned recently that information belonging to Cloud WAF (Incapsula) customers who had accounts through September 2017 was exposed as a result of a security incident. [Read More]
Some of the airlines that manage booking systems themselves expose customer information, a researcher has warned. [Read More]
The Linux Foundation is joined by Google, IBM, Intel, Microsoft and other tech giants in creating the Confidential Computing Consortium. [Read More]
Visa this week announced a new set of capabilities aimed at improving fraud prevention and cybersecurity of payment systems. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Alastair Paterson's picture
While a boon to productivity, some of the most ubiquitous file sharing services across the Internet are also at the heart of a global problem – publicly exposed data.
Jim Ivers's picture
More vulnerabilities create more attacks; more attacks breed additional fatigue. So how can we wake up and fix the problems creating such a widespread headache?
Justin Fier's picture
When we look at this cycle of stealthy and silent data breaches, we have to ask ourselves: how can such tremendous amounts of data leave our corporate networks without raising any alarms?
Joshua Goldfarb's picture
Many organizations seem to focus almost entirely on technological solutions to tactical problems, rather than on strategically addressing how they can best and most efficiently protect data.
Lance Cottrell's picture
Passive Information Leakage (PIL) is one of the least known and most difficult forms of data lost to prevent, and is little understood, primarily because it cannot be addressed through conventional security practices.
Steven Grossman's picture
The challenge of data protection is not going away. Even without the ever-improving tactics of the bad guys, data sprawl has made it difficult for those just trying to do their jobs.
Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.
Alastair Paterson's picture
What can U.S.-based companies do to prepare for the GDPR that is due to come into force in May 2018? These five steps can help.
Jennifer Blatnik's picture
Almost every industry can improve efficiencies with blockchain. But what will make blockchain a success is ultimately security.
Steven Grossman's picture
Organizations are increasingly combining UEBA technology with other data sources and analytics methods to overcome cyber risk challenges on a broader scale.