Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The company sued two individuals for using browser extensions to scrape user profiles and other information from its website. [Read More]
The NSA issues guidance on the use of DNS over HTTPS (DoH), which encrypts DNS requests to improve privacy. [Read More]
According to a Wall Street Journal report, TikTok used a banned tactic to bypass the privacy safeguard in Android to harvest unique identifiers from millions of mobile devices. [Read More]
Any EU country can take legal action against companies like Facebook over cross-border violations of data privacy rules, not just the main regulator in charge of the company. [Read More]
The stolen documents were related to Pfizer and BioNTech’s COVID-19 vaccine candidate. [Read More]
WhatsApp on Tuesday reassured users about privacy at the Facebook-owned messaging service as people flocked to rivals Telegram and Signal following a tweak to its terms. [Read More]
A watchdog agency for the U.S. Census Bureau says that proper information-technology security safeguards weren’t in place leading up to the start of the 2020 census. [Read More]
The Microsoft Defender for Endpoint on Linux hits GA milestone and now provides endpoint detection and response (EDR) capabilities to all users. [Read More]
The U.S. chipmaker is adding hardware to the arsenal of tools available to defend against destructive and costly ransomware attacks. [Read More]
Ubiquity says no databases containing user data appear to have been accessed as a result of the data breach. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Gunter Ollmann's picture
CISOs and their security teams need to quickly master these technologies if they’re to successfully partner with in-house development teams and secure “data-in-use.”
Gunter Ollmann's picture
It is reasonable to assume that within five years the term “confidential compute” will become superfluous and an assumed native component of all cloud services.
Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.
Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.
Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Ellison Anne Williams's picture
Data in Use has become a point of least resistance for an attacker. There is a major industry need to recognize this lapse and close the gap in data security by protecting data while it is being used.
Gunter Ollmann's picture
DLP has always been tricky to deploy and enforce, and most CISOs can freely regale stories of DLP promises and their subsequent failures.
Ellison Anne Williams's picture
Data protection schemes must recognize and secure data as it exists at all points in the processing lifecycle, whether at rest, in transit, or in use.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.