Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

IBM releases firmware and operating system updates to address the Meltdown and Spectre vulnerabilities in Power Systems servers [Read More]
Decryption keys for a current version of Cryakl ransomware have been obtained and uploaded to the NoMoreRansom website [Read More]
Two more misconfigured databases exposing the personal details of thousands of people were disclosed late last week [Read More]
The personal details of 800,000 customers of Swiss telecoms giant Swisscom were compromised in a data breach [Read More]
Intel has started releasing new firmware updates that should address the Spectre vulnerability after the first round of patches caused problems [Read More]
The massive 2016 breach that Uber covered up for more than a year was the work of a couple of individuals from Canada and Florida [Read More]
Malware and phishing attacks growingly abuse SSL to increase their chances of success, Zscaler said in its latest report [Read More]
Developers of the grammar checker Grammarly rushed to patch a serious vulnerability that exposed user data [Read More]
Kaspersky expands SMB offering with a new product designed to provide an extra layer of security for the Exchange Online email service in Office 365 [Read More]
Google Cloud Identity & Access Management (IAM) users can now assign custom roles for fine-grained security [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Joshua Goldfarb's picture
Many organizations seem to focus almost entirely on technological solutions to tactical problems, rather than on strategically addressing how they can best and most efficiently protect data.
Lance Cottrell's picture
Passive Information Leakage (PIL) is one of the least known and most difficult forms of data lost to prevent, and is little understood, primarily because it cannot be addressed through conventional security practices.
Steven Grossman's picture
The challenge of data protection is not going away. Even without the ever-improving tactics of the bad guys, data sprawl has made it difficult for those just trying to do their jobs.
Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.
Alastair Paterson's picture
What can U.S.-based companies do to prepare for the GDPR that is due to come into force in May 2018? These five steps can help.
Jennifer Blatnik's picture
Almost every industry can improve efficiencies with blockchain. But what will make blockchain a success is ultimately security.
Steven Grossman's picture
Organizations are increasingly combining UEBA technology with other data sources and analytics methods to overcome cyber risk challenges on a broader scale.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Erin O’Malley's picture
The CIA conducts extensive background investigations and requires polygraph examinations to gain a security clearance, yet a malicious insider apparently made off with a trove of secret CIA hacking tools.
Ashley Arbuckle's picture
The healthcare industry has a lot to gain by digital transformation. However it also has a lot to lose if it doesn’t start with security as a foundation.