Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Several vulnerabilities found and patched in some Dell EMC data protection products. Some VMware products are also impacted [Read More]
Microsoft Word's subDoc feature that allows for the loading of sub-documents from a master document can be abused by attackers to steal a user’s credentials, Rhino Security Labs reveals. [Read More]
Intel has started releasing software and firmware updates to protect devices against Meltdown and Spectre attacks. Updates expected for most CPUs by the end of next week [Read More]
Microsoft, Amazon, ARM, Google, Apple and others have addressed the Meltdown and Spectre vulnerabilities affecting CPUs [Read More]
Devices with Intel, AMD and ARM CPUs are vulnerable to Meltdown and Spectre attacks, which can allow hackers to obtain passwords and other sensitive information [Read More]
A critical vulnerability affecting all Intel CPUs will soon be disclosed. Mitigations can lead to significant performance penalties [Read More]
Trackmageddon - researchers discovered that over 100 online GPS services have vulnerabilities that expose location and other data associated with millions of tracking devices [Read More]
Clothing retailer Forever 21 informed customers that malware collected data from its payment systems for a period of more than 7 months [Read More]
Nissan Canada is informing more than 1.1 million customers that their personal information may have been compromised as a result of a data breach [Read More]
Some of the rugged tablets, phones and PDAs made by Pepperl+Fuchs-owned ecom are vulnerable to KRACK attacks [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Joshua Goldfarb's picture
Many organizations seem to focus almost entirely on technological solutions to tactical problems, rather than on strategically addressing how they can best and most efficiently protect data.
Lance Cottrell's picture
Passive Information Leakage (PIL) is one of the least known and most difficult forms of data lost to prevent, and is little understood, primarily because it cannot be addressed through conventional security practices.
Steven Grossman's picture
The challenge of data protection is not going away. Even without the ever-improving tactics of the bad guys, data sprawl has made it difficult for those just trying to do their jobs.
Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.
Alastair Paterson's picture
What can U.S.-based companies do to prepare for the GDPR that is due to come into force in May 2018? These five steps can help.
Jennifer Blatnik's picture
Almost every industry can improve efficiencies with blockchain. But what will make blockchain a success is ultimately security.
Steven Grossman's picture
Organizations are increasingly combining UEBA technology with other data sources and analytics methods to overcome cyber risk challenges on a broader scale.
Alastair Paterson's picture
By using best practices to protect credentials, while at the same time monitoring for leaked credentials and changes in the tools attackers use, you can mitigate the risk of account takeovers to your organization.
Erin O’Malley's picture
The CIA conducts extensive background investigations and requires polygraph examinations to gain a security clearance, yet a malicious insider apparently made off with a trove of secret CIA hacking tools.
Ashley Arbuckle's picture
The healthcare industry has a lot to gain by digital transformation. However it also has a lot to lose if it doesn’t start with security as a foundation.