Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

EDP Renewables North America has admitted that a recent cyberattack aimed at its parent company, which involved ransomware, also resulted in hackers accessing its own systems. [Read More]
A US Senate panel Thursday approved legislation aimed at combatting online child exploitation as civil liberties activists warned the measure could lead to an array of constitutional and privacy problems. [Read More]
Zoom announces the progress it has made in terms of security and privacy, but experts believe the company still faces many challenges. [Read More]
An Elasticsearch database pertaining to e-learning platform OneClass was found to expose data on over one million students and lecturers. [Read More]
Republican senators have introduced what they have described as a “balanced” bill that would require tech companies to give law enforcement access to encrypted data. [Read More]
A top German court has ordered Facebook to stop merging data collected through its Whatsapp and Instagram subsidiaries or other websites unless users explicitly agree, in a legal victory for competition authorities. [Read More]
Microsoft president Brad Smith on Tuesday said Europe was the global leader on setting rules for big tech, two years after the EU implemented the GDPR, its landmark data privacy law. [Read More]
Twitter has informed business users that their billing information may have been exposed through their web browser’s cache. [Read More]
The United States is taking additional steps toward serving .gov domains over encrypted connections, and this week laid out plans to preload the entire top-level domain (TLD). [Read More]
Apple has announced several new privacy and security features at its 2020 Worldwide Developers Conference (WWDC). [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.
Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Ellison Anne Williams's picture
Data in Use has become a point of least resistance for an attacker. There is a major industry need to recognize this lapse and close the gap in data security by protecting data while it is being used.
Gunter Ollmann's picture
DLP has always been tricky to deploy and enforce, and most CISOs can freely regale stories of DLP promises and their subsequent failures.
Ellison Anne Williams's picture
Data protection schemes must recognize and secure data as it exists at all points in the processing lifecycle, whether at rest, in transit, or in use.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Preston Hogue's picture
Security teams should think about how company data might connect with data from other organizations or industries and how those combined data sets could be triangulated into a larger picture that ultimately puts you at risk.