Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

South Korean-based industrial manufacturer DK-LOK was found to leak internal and external communications, including customer data. [Read More]
Data protection firm BigID raises $50 million in a Series C funding round, which brings the total raised by the company to nearly $100 million. [Read More]
Phone numbers linked to more than 400 million Facebook accounts were reportedly found online, but the social media giant believes the actual number of impacted accounts is roughly half of that. [Read More]
Google agreed Wednesday to pay $170 million to settle charges that it illegally collected and shared data from children on its YouTube video service, a deal critics said was too soft on the internet giant. [Read More]
The XKCD forum has been taken offline after suffering a data breach that impacted 562,000 users. [Read More]
Imperva learned recently that information belonging to Cloud WAF (Incapsula) customers who had accounts through September 2017 was exposed as a result of a security incident. [Read More]
Some of the airlines that manage booking systems themselves expose customer information, a researcher has warned. [Read More]
The Linux Foundation is joined by Google, IBM, Intel, Microsoft and other tech giants in creating the Confidential Computing Consortium. [Read More]
Visa this week announced a new set of capabilities aimed at improving fraud prevention and cybersecurity of payment systems. [Read More]
Apple, Google and Mozilla respond to Kazakhstan’s efforts to spy on its citizens by requiring them to install a root certificate on their devices. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Ellison Anne Williams's picture
Data in Use has become a point of least resistance for an attacker. There is a major industry need to recognize this lapse and close the gap in data security by protecting data while it is being used.
Gunter Ollmann's picture
DLP has always been tricky to deploy and enforce, and most CISOs can freely regale stories of DLP promises and their subsequent failures.
Ellison Anne Williams's picture
Data protection schemes must recognize and secure data as it exists at all points in the processing lifecycle, whether at rest, in transit, or in use.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Preston Hogue's picture
Security teams should think about how company data might connect with data from other organizations or industries and how those combined data sets could be triangulated into a larger picture that ultimately puts you at risk.
Bradon Rogers's picture
While a contract, distributed, partner-oriented workforce and supply chain can create serious risks to your organization, careful implementation of visibility and data protection strategies can help you mitigate many of the risks.