Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Cryptographers at Swiss university ETH Zurich have found at least five exploitable security flaws in the privacy-themed MEGA cloud storage service [Read More]
Aqua Security releases open source tool for auditing the software supply chain to ensure compliance with newly created CIS guidelines. [Read More]
SYN Ventures is leading a $23 million Series A investment in RevealSecurity, a startup building technology to thwart malicious insider threats. [Read More]
The industry and government, minus lobbyists, need to come together from the bottom up rather than top down – and talk about regulations. [Read More]
The deep tech company has received new investment from Elaia Partners and La Banque Postale’s 115K innovation fund. [Read More]
Disguised as a cryptocurrency miner, Malibot focuses on stealing financial information, cryptocurrency wallets, and personally identifiable information (PII). [Read More]
Big-game malware hunters at Volexity call attention to a sophisticated Chinese APT caught recently exploiting a Sophos firewall zero-day to plant backdoors and launch man-in-the-middle attacks. [Read More]
An Israeli startup promising technology to help developers simplify security has banked an eye-opening $38.5 million in seed-stage funding. [Read More]
Academic researchers describe Hertzbleed, a new Intel and AMD CPU side-channel attack that leverages remote timing to extract secrets from the targeted system. [Read More]
Zero trust at the data level provides better security than zero trust at the application level; and attribute-based access control (ABAC) rather than role-based access control (RBAC) provides more efficient and granular access to the data. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Gordon Lawson's picture
Obfuscation technology creates a path to data and applications residing in commercial clouds that cannot be traced, and can be helpful for healthcare data security
Landon Winkelvoss's picture
The security industry must commit to a risk-based approach that understands the specific attacks and actors targeting their industry and profile.
Laurence Pitt's picture
With tight resources for managing healthcare, the IT challenge to keep track of vast amounts of data being created, accessed and modified is critical.
Gordon Lawson's picture
Most cyber insurance providers are demanding that companies supply proof of their backup implementation in order to obtain an affordable policy.
Laurence Pitt's picture
Cybersecurity Awareness Month is an excellent time to reflect on any changes made, and that might still need to be made since, as for many people hybrid has become the working ‘normal.’
William Lin's picture
Data security is a tough topic to summarize and I’d argue it may be the most misunderstood category in security right now.
Gunter Ollmann's picture
CISOs and their security teams need to quickly master these technologies if they’re to successfully partner with in-house development teams and secure “data-in-use.”
Gunter Ollmann's picture
It is reasonable to assume that within five years the term “confidential compute” will become superfluous and an assumed native component of all cloud services.
Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.
Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.