Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Access governance company SPHERE has raised $10 million in a Series A funding round led by ForgePoint Capital. [Read More]
Apple has published an updated Platform Security Guide, providing detailed technical explanations on the security features and technology implemented in its products. [Read More]
The U.S. Justice Department indicted three North Korean military intelligence officials linked to cyber-attacks, including the theft of $1.3 billion in money and crypto-currency from organizations around the world. [Read More]
Code security firm Spectral emerges from stealth mode with $6.2 million in seed funding. [Read More]
Enterprise cybersecurity powerhouse Palo Alto spends $156 million to acquire an early-stage DevOps security startup. [Read More]
France's national cybersecurity agency is publicly blaming the Sandworm APT group for a string of long-term intrusions at European software and web hosting organizations. [Read More]
VMware has patched a vulnerability in its vSphere Replication product that can facilitate attacks on enterprises. [Read More]
The U.S. Department of Justice secures a seven-year prison sentence for a Ukrainian man running a lucrative money-mule laundering scheme. [Read More]
Forescout researchers warn that improperly generated ISNs (Initial Sequence Numbers) leave TCP connections exposed to malicious hacker attacks. [Read More]
Data privacy management company WireWheel has raised $20 million in a Series B funding round. [Read More]

FEATURES, INSIGHTS // Data Protection

rss icon

Gunter Ollmann's picture
CISOs and their security teams need to quickly master these technologies if they’re to successfully partner with in-house development teams and secure “data-in-use.”
Gunter Ollmann's picture
It is reasonable to assume that within five years the term “confidential compute” will become superfluous and an assumed native component of all cloud services.
Alastair Paterson's picture
Opportunities for accidental exposure of sensitive information are often compounded by multiple stakeholders using collaborative tools without the proper policies, oversight and security training.
Laurence Pitt's picture
For an MSP looking to grow business, the convergence of SD-WAN and security, along with the transitional needs of customers, translates to opportunity.
Jim Gordon's picture
Individuals and security professionals should have a 360 mindset and know the actions needed to take in the pursuit of data protection and the preservation of privacy.
Alastair Paterson's picture
If it takes a whole village to raise a child, it takes a whole community of vendors and business partners to build a secure data environment.
Ellison Anne Williams's picture
Data in Use has become a point of least resistance for an attacker. There is a major industry need to recognize this lapse and close the gap in data security by protecting data while it is being used.
Gunter Ollmann's picture
DLP has always been tricky to deploy and enforce, and most CISOs can freely regale stories of DLP promises and their subsequent failures.
Ellison Anne Williams's picture
Data protection schemes must recognize and secure data as it exists at all points in the processing lifecycle, whether at rest, in transit, or in use.
Torsten George's picture
By implementing the core pillars of GDPR, organizations can assure they meet the mandate’s requirements while strengthening their cyber security posture.