Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Whistleblowers and digital pioneers have long been sounding the alarm about abuses of our privacy online, and tech entrepreneurs are bidding to turn growing consciousness about the problem into a money-making industry. [Read More]
Leaked documents from a civil suit against Facebook show how the social network aimed to employ user data as a tool for bargaining and to manipulate competitors. [Read More]
Facebook says 100 third-party application developers continued to access user information via the Groups API even after access to the data was restricted. [Read More]
In addition to new security tools for Azure, at the Ignite 2019 conference this week, Microsoft announced new capabilities aimed at improving the security of its users across platforms. [Read More]
Technology has given internet giants "irresistible power" when they work in concert with governments, whistleblower Ed Snowden told the Web Summit that opened in Lisbon on Monday. [Read More]
The Betty Jean Kerr People's Health Center in St. Louis says a cyber-attack has caused a data breach that potentially affected 152,000 people. [Read More]
Researchers discovered that Adobe exposed 7.5 million records associated with Creative Cloud customers, including email addresses and other account information. [Read More]
Data security company Very Good Security (VGS) raises $35 million in a Series B funding round led by Goldman Sachs. [Read More]
Outdated and unsupported operating systems are still present and they still pose a serious risk in many industrial organizations. [Read More]
TorGuard and NordVPN respond to reports that their systems were breached, and both blamed the incident on a third-party service provider. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Ellison Anne Williams's picture
Data in Use has become a point of least resistance for an attacker. There is a major industry need to recognize this lapse and close the gap in data security by protecting data while it is being used.
Gunter Ollmann's picture
DLP has always been tricky to deploy and enforce, and most CISOs can freely regale stories of DLP promises and their subsequent failures.
Ellison Anne Williams's picture
Data protection schemes must recognize and secure data as it exists at all points in the processing lifecycle, whether at rest, in transit, or in use.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Preston Hogue's picture
Security teams should think about how company data might connect with data from other organizations or industries and how those combined data sets could be triangulated into a larger picture that ultimately puts you at risk.
Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.