Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Zettaset announced the addition of data-in-motion encryption as a new feature in its flagship management and security add-on application for Hadoop.
Toshiba's MQ01ABUxxxBW series hard disk drives (HDD) has achieved validation to U.S. Federal Information Processing Standard 140-2 (FIPS 140-2).
Organizations face a number of security challenges when integrating various data sources, a speaker told attendees at GigaOm's Structure Data conference.
Covertix helps customers control and protect sensitive data, while continuing to use their preferred cloud storage. SecurityWeek sat down with CEO Yoran Sirkis to discuss the security startup.
There is a perception that how quickly an organization detects a security incident and executes a response plan can enhance its reputation. This potential return on investment is encouraging more organizations to focus their energies on a formal incident response team and plan, according to a survey by Arbor Networks.
HITRUST will conduct monthly cyber threat briefings in partnership with the U.S. Department of Health and Human Services and notify healthcare organizations about high probability and impact cyber threats targeted at the healthcare industry.
Halocore for SAP NetWeaver provides protection against loss, leak, and theft of sensitive data, beyond the traditional network boundaries.
The recently-disclosed data breach at Neiman Marcus has turned out to not be as bad as the company originally thought.
Attacks against medical devices and critical health care systems are no longer theoretical. In fact, according to a report from the SANS Institute, poorly protected health care systems are not able to fight off the barrage of attacks.
When it comes to securing a Linux machine, the answer is not installing an antivirus or some other security software. The key lies in hardening the operating system.

FEATURES, INSIGHTS // Data Protection

rss icon

Chris Hinkley's picture
When the development cycle moves quickly, it will often bypass security. When rapid development equates to shoehorning security controls in after the fact, we’re left with an approach that has potentially disastrous consequences.
Mark Hatton's picture
The oversight for the protection of healthcare information is only getting tighter, and it is incumbent upon the security teams to ensure healthcare professionals have all the tools necessary to improve patient outcomes, while we worry about keeping the bad guys away.
Wade Williamson's picture
If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.
Jon-Louis Heimerl's picture
The concepts of defense in depth have been with us for years -- hundreds of years, if not thousands. Maybe we can learn something from those architects of warfare from the Middle Ages?
Michael Callahan's picture
While I’d argue the point that the chip and PIN system is better and more secure than the mag stripe, it’s not what caused these or what will prevent future malware attacks.
Torsten George's picture
While security monitoring generates big data, in its raw form it remains only a means to an end. Ultimately, information security decision making should be based on prioritized, actionable insight derived from the data.
Mike Tierney's picture
The insider threat is very much a reality, and because it hides in the details, it’s one of the biggest threats businesses can encounter.
Gil Zimmermann's picture
IT managers focused on protecting technology infrastructure would do well to assess whether cloud service providers have better security systems in place than their own corporate IT resources allow.
Dr. Mike Lloyd's picture
Every security team that can fog a mirror is asking the question “what just happened at Target, and how do we make sure that doesn’t happen to us?”
Michael Callahan's picture
The threats that companies face will continue to accelerate. And while that might seem like a very obvious and not so insightful observation, the devil is in the details. Here are the trends both in the threats and how we will respond to them in 2014.