Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Apple, Cisco, Mozilla, Kaspersky and others are concerned about Australia's encryption laws, despite the government specifically claiming it will not weaken encryption [Read More]
You might not have a choice if it's a service you use regularly. But for those you no longer use, consider a purge. Plus, it might feel good to get your online life in order, the way organizing a closet does. [Read More]
Industry professionals comment on recent Google+ security incident involving a bug that exposed personal information from 500,000 accounts [Read More]
Google was supposed to be focusing on its launch of a new smartphone and other devices, but the event was being overshadowed by a firestorm over a privacy glitch that forced it to shut down its struggling social network. [Read More]
Industry professionals comment on reports that China planted spy chips in Super Micro servers used by Amazon, Apple and many other organizations in the US [Read More]
Apple chief executive Tim Cook said the company is devoted to protecting people's privacy, with data encrypted and locked away on servers even in China. [Read More]
California governor signs IoT cybersecurity law, along with a state-level net neutrality law [Read More]
Facebook shares more details about the massive hack affecting 50 million accounts, including the exploited bugs, impact on users, attack timeline, and impact on Facebook [Read More]
Uber will pay $148 million and tighten data security after it failed for a year to notify drivers that hackers had stolen their personal information, according to a settlement announced Wednesday. [Read More]
Mozilla has launched a new service that helps users easily check if their email addresses are part of publicly known data breaches. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Preston Hogue's picture
Security teams should think about how company data might connect with data from other organizations or industries and how those combined data sets could be triangulated into a larger picture that ultimately puts you at risk.
Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.
Alastair Paterson's picture
While a boon to productivity, some of the most ubiquitous file sharing services across the Internet are also at the heart of a global problem – publicly exposed data.
Jim Ivers's picture
More vulnerabilities create more attacks; more attacks breed additional fatigue. So how can we wake up and fix the problems creating such a widespread headache?
Justin Fier's picture
When we look at this cycle of stealthy and silent data breaches, we have to ask ourselves: how can such tremendous amounts of data leave our corporate networks without raising any alarms?
Joshua Goldfarb's picture
Many organizations seem to focus almost entirely on technological solutions to tactical problems, rather than on strategically addressing how they can best and most efficiently protect data.
Lance Cottrell's picture
Passive Information Leakage (PIL) is one of the least known and most difficult forms of data lost to prevent, and is little understood, primarily because it cannot be addressed through conventional security practices.
Steven Grossman's picture
The challenge of data protection is not going away. Even without the ever-improving tactics of the bad guys, data sprawl has made it difficult for those just trying to do their jobs.
Jennifer Blatnik's picture
By taking what you know about security in the physical world and logically applying it to the virtual world, you can effectively protect your personal information.