Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A new report focusing on Europe's General Data Protection Regulation (GDPR) preparedness shows a worrying disconnect between Business and Security. [Read More]
An analysis of the Alexa top 1 million websites with Mozilla Observatory showed significant improvements in the use of modern security technologies [Read More]
Akamai launches new product designed to protect enterprises against malware, phishing and data exfiltration attempts by analyzing DNS requests [Read More]
KThe antara Initiative has released an open, global consent receipt specification for use with the European Union’s (EU) General Data Protection Regulation (GDPR). [Read More]
A government contractor has been charged for leaking a classified NSA report on Russia election hacking to The Intercept [Read More]
Crowdfunding initiative for buying Shadow Brokers exploits canceled. Researchers cite legal reasons, including Russia (FSB) involvement [Read More]
Many organizations believe an attack on their medical devices will likely occur in the next year, but few are taking significant steps to prevent attacks [Read More]
Summary and roundup of this new products, surveys and cybersecurity industry comments on the upcoming General Data Protection Regulation (GDPR). [Read More]
While there is a general lack of preparedness for GDPR among most organizations, specific concerns and expectations can vary widely between the different nations. [Read More]
Retailer Target agrees to pay $18.5 million to 47 U.S. states as part of a settlement over the massive data breach suffered by the company in 2013 [Read More]

FEATURES, INSIGHTS // Compliance

rss icon

Travis Greene's picture
Reducing the amount of personal data subject to GDPR is a critical step towards minimizing the amount of risk that GDPR will expose.
Steven Grossman's picture
The PCI DSS 3.2 should greatly help companies reduce third party vendor risk, and is starting to shift from just a check-the-compliance-box activity to a more continuous compliance model.
Travis Greene's picture
To understand why return on Access Governance is lower versus other security technologies, we first need to understand why Access Governance is implemented in the first place.
Torsten George's picture
To achieve continuous compliance and monitoring, organizations are forced to automate many otherwise manual, labor-intensive tasks.
Torsten George's picture
The NIST Cybersecurity Framework is an important building block, but still just the first step towards implementing operationalized defenses against cyber security risks.
James McFarlin's picture
U.S tech giants are playing a game of high-stakes global brinksmanship around who has rights to control their data, which impacts their European growth prospects, business models, and ultimately stock valuations.
Mark Hatton's picture
The oversight for the protection of healthcare information is only getting tighter, and it is incumbent upon the security teams to ensure healthcare professionals have all the tools necessary to improve patient outcomes, while we worry about keeping the bad guys away.
Nimmy Reichenberg's picture
With the release of PCI-DSS 3.0, organizations have a framework for payment security as part of their business-as-usual activities by introducing more flexibility, and an increased focus on education, awareness and security as a shared responsibility.
Mark Hatton's picture
Complacency is never a good thing, but in security it can have devastating effects. While it’s good to acknowledge progress, that should never stand in the way of staying ahead of the next potential threat.
Chris Hinkley's picture
For security professionals, PCI DSS 3.0 means that PCI compliance will become more of an everyday business practice, rather than an annual checklist obligation.