Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Facebook is asking EU courts to review "exceptionally broad" requests by antitrust regulators there that would scoop up employees' personal information. [Read More]
The creators of the Mooltipass hardware password manager have unveiled Mooltipass Mini BLE, a Bluetooth-enabled version that includes many new and useful features. [Read More]
Australia’s consumer watchdog launched court action against Google on Monday alleging the technology giant misled account holders about its use of their personal data. [Read More]
Chinese drone maker DJI has responded to the disclosure of security issues found in its Android app, which researchers compared to malware behavior. [Read More]
Facebook has announced new privacy and security features for Messenger, including App Lock and a new Privacy settings section. [Read More]
Researchers disclose the details of Shadow Attacks, new methods for hiding and replacing content in signed PDF files without invalidating their signature. [Read More]
Data protection and privacy regulators from six countries around the world have sent a joint letter to video conferencing companies urging them to address security and privacy risks. [Read More]
Polymer announces its official launch with a solution that automatically detects and redacts sensitive data shared in popular collaboration tools such as Slack, Zoom and GitHub. [Read More]
Microsoft has unveiled new security capabilities for Microsoft 365 and Azure, along with a new Endpoint Data Loss Prevention solution. [Read More]
Microsoft has revealed plans to move forward with the retirement of the TLS 1.0 and 1.1 protocols in Office 365, starting October 15, 2020. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.
Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.
Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Ellison Anne Williams's picture
Data in Use has become a point of least resistance for an attacker. There is a major industry need to recognize this lapse and close the gap in data security by protecting data while it is being used.
Gunter Ollmann's picture
DLP has always been tricky to deploy and enforce, and most CISOs can freely regale stories of DLP promises and their subsequent failures.
Ellison Anne Williams's picture
Data protection schemes must recognize and secure data as it exists at all points in the processing lifecycle, whether at rest, in transit, or in use.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.
Laurence Pitt's picture
Failure to implement basic cybersecurity hygiene practices will leave retailers vulnerable to damage and fines during a lucrative time for their businesses.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.