Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

BlueLeaks: Distributed Denial of Secrets has leaked hundreds of thousands of files belonging to over 200 law enforcement agencies, obtained by Anonymous hackers from a web development firm. [Read More]
France's highest administrative authority on Friday dismissed a challenge by Google against a fine of 50 million euros ($56 million) for failing to provide adequate information on its data consent policies. [Read More]
Zoom announced that it will offer end-to-end encryption to free users as long as they provide a phone number to verify their account. [Read More]
Cloud native data security platform Open Raven this week announced that it has closed a $15 million Series A funding, which brings the total raised to date to $19.1 million. [Read More]
Sen. Ron Wyden has raised concerns about the ability of intelligence agencies to protect secrets and has asked the director of national intelligence about steps taken to improve cybersecurity. [Read More]
A group of security researchers has devised a new technique for eavesdropping on conversations that relies on the analysis of a light bulb’s frequency response to sound. [Read More]
United States House representatives last week sent a letter to Zoom to demand explanation for the communication platform’s decision to close the accounts of U.S.-based Chinese activists. [Read More]
jSonar, a company that provides database security solutions, has raised $50 million from Goldman Sachs. [Read More]
Data discovery, privacy and security provider 1touch.io has secured $14 million in Series A funding, which will help it boost R&D and field presence. [Read More]
IBM has released open source toolkits that allow the manipulation of encrypted data without the need to decrypt it. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.
Alastair Paterson's picture
While a boon to productivity, some of the most ubiquitous file sharing services across the Internet are also at the heart of a global problem – publicly exposed data.
Jim Ivers's picture
More vulnerabilities create more attacks; more attacks breed additional fatigue. So how can we wake up and fix the problems creating such a widespread headache?
Justin Fier's picture
When we look at this cycle of stealthy and silent data breaches, we have to ask ourselves: how can such tremendous amounts of data leave our corporate networks without raising any alarms?
Joshua Goldfarb's picture
Many organizations seem to focus almost entirely on technological solutions to tactical problems, rather than on strategically addressing how they can best and most efficiently protect data.
Lance Cottrell's picture
Passive Information Leakage (PIL) is one of the least known and most difficult forms of data lost to prevent, and is little understood, primarily because it cannot be addressed through conventional security practices.
Steven Grossman's picture
The challenge of data protection is not going away. Even without the ever-improving tactics of the bad guys, data sprawl has made it difficult for those just trying to do their jobs.
Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.
Alastair Paterson's picture
What can U.S.-based companies do to prepare for the GDPR that is due to come into force in May 2018? These five steps can help.
Jennifer Blatnik's picture
Almost every industry can improve efficiencies with blockchain. But what will make blockchain a success is ultimately security.