Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Evident, an Atlanta-based company that specializes in identity and credential verification, raises $20 million in a Series B funding round. [Read More]
A former government intelligence analyst has been charged with leaking classified documents about military campaigns against terrorist group al-Qaeda to a reporter. [Read More]
Freedom Mobile, Canada's fourth largest mobile network operator, leaked the details of many customers, including their contact information, date of birth, and payment card data. [Read More]
The United States on Thursday urged "like-minded governments" from the European Union to be cautious and coordinate their policies on 5G network security in light of suspicions over the system proposed by Chinese giant Huawei. [Read More]
Microsoft announced more control and options designed to provide Microsoft 365 customers with the ability to strengthen their data privacy practices. [Read More]
An unprotected database belonging to an unidentified organization stored information on 80 million US households. [Read More]
The UK supermarket chain Morrisons' legal battle with 5,500 of its own employees over vicarious liability introduces a new threat element to the already complex and confusing demands of the EU's General Data Protection Regulation (GDPR). [Read More]
Ireland’s privacy regulator says it’s investigating Facebook over the social media giant’s recent revelation that it had left hundreds of millions of user passwords exposed. [Read More]
Facebook said it expects a fine of up to $5 billion from the Federal Trade Commission, which is investigating whether the social network violated its users’ privacy. [Read More]
Data protection provider Digital Guardian raises $30 million in a financing round that will help it accelerate product development and innovation. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Ellison Anne Williams's picture
Data in Use has become a point of least resistance for an attacker. There is a major industry need to recognize this lapse and close the gap in data security by protecting data while it is being used.
Gunter Ollmann's picture
DLP has always been tricky to deploy and enforce, and most CISOs can freely regale stories of DLP promises and their subsequent failures.
Ellison Anne Williams's picture
Data protection schemes must recognize and secure data as it exists at all points in the processing lifecycle, whether at rest, in transit, or in use.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Preston Hogue's picture
Security teams should think about how company data might connect with data from other organizations or industries and how those combined data sets could be triangulated into a larger picture that ultimately puts you at risk.
Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.
Alastair Paterson's picture
While a boon to productivity, some of the most ubiquitous file sharing services across the Internet are also at the heart of a global problem – publicly exposed data.
Jim Ivers's picture
More vulnerabilities create more attacks; more attacks breed additional fatigue. So how can we wake up and fix the problems creating such a widespread headache?