Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cornami, a company that helps companies secure data from post-quantum threats, raises $68 million in oversubscribed Series C funding. [Read More]
Pangea Cyber, an early-stage startup working on technology to help developers add security and compliance features to applications, has landed $25 million in venture capital financing. [Read More]
Researchers at NCC Group create a tool for conducting a new type of Bluetooth Low Energy (BLE) relay attack that bypasses existing protections. [Read More]
New research find the Iran-linked hacking group OilRig using a new backdoor in an attack against a government official within Jordan’s foreign ministry. [Read More]
Texas startup Balkan ID banks $5.75 million in seed funding to help organizations find and remediate risky privileges across SaaS and public cloud infrastructure. [Read More]
Over the last 24 hours, two Silicon Valley startups jostling for space in the corporate email security market raised venture capital funding at a combined valuation of $5.1 billion. [Read More]
Microsoft patches at least 73 documented security flaws in the Windows ecosystem and warned that unknown attackers are already launching zero-day man-in-the-middle attacks. [Read More]
Adobe ships patches for at least 18 serious security defects in multiple enterprise-facing products and warned that unpatched systems are at risk of remote code execution attacks [Read More]
The U.S. government is barreling ahead with plans to mitigate future threats from quantum computing with a new White House memo directing federal agencies to jumpstart an all-hands-on-deck approach to migrating to quantum-resistant technologies. [Read More]
Threat hunters at Kaspersky find a malicious campaign that abuses Windows event logs to store fileless last stage Trojans and keep them hidden in the file system. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Gordon Lawson's picture
Obfuscation technology creates a path to data and applications residing in commercial clouds that cannot be traced, and can be helpful for healthcare data security
Landon Winkelvoss's picture
The security industry must commit to a risk-based approach that understands the specific attacks and actors targeting their industry and profile.
Laurence Pitt's picture
With tight resources for managing healthcare, the IT challenge to keep track of vast amounts of data being created, accessed and modified is critical.
Gordon Lawson's picture
Most cyber insurance providers are demanding that companies supply proof of their backup implementation in order to obtain an affordable policy.
Laurence Pitt's picture
Cybersecurity Awareness Month is an excellent time to reflect on any changes made, and that might still need to be made since, as for many people hybrid has become the working ‘normal.’
William Lin's picture
Data security is a tough topic to summarize and I’d argue it may be the most misunderstood category in security right now.
Gunter Ollmann's picture
CISOs and their security teams need to quickly master these technologies if they’re to successfully partner with in-house development teams and secure “data-in-use.”
Gunter Ollmann's picture
It is reasonable to assume that within five years the term “confidential compute” will become superfluous and an assumed native component of all cloud services.
Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.
Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.