Privacy

6648b1abd4a9b964566c3690613f20a6

GDPR Is Coming. Is Your Organization Ready?

May 01, 2018 Added by:Mark Baldwin

The General Data Protection Regulation (GDPR) that goes into effect on May 25 affects any business that processes information of any EU citizen, regardless of whether the business is located in or has operations in the EU.

Comments  (0)

9ae0fe776de46500a4f71f32673fad0f

Increasing Importance of Mobile Makes Malware a Priority

January 17, 2018 Added by:Asma Zubair

Businesses should fortify their high value apps with additional security precautions from the inside out.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

The 5 Motives of Ransomware

January 04, 2018 Added by:Joseph Carson

Who would have foreseen the impact of both WannaCry and NotPetya

Comments  (0)

7fc123e0c16f296ad28a8c3214506aa9

Follow the Money — Stemming Hacker Habits

June 30, 2017 Added by:Steve McGregory

Cybercriminals aren’t stopping anytime soon. Ensure you have a finger on the pulse of your network or be ready to become another notch on a hacker’s belt.

Comments  (0)

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Pro: Encryption Explained

April 13, 2017 Added by:Logan Kipp

Modern encryption has become an arms race between brilliant mathematicians and their computers, and hackers and theirs.

Comments  (0)

Fa053a3185c9b7154992fb4bffe11e76

FriendFinder Breach Highlights the Need for Better Practice in Password Security

January 31, 2017 Added by:Donato Capitella

The FriendFinder Network breach is a perfect example of how poor password storage can exacerbate the impact of a breach and expose accounts to further exploitation.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

Differential Privacy vs. End-to-end Encryption – It’s Privacy vs. Privacy!

October 12, 2016 Added by:Vanishree Rao

While differential privacy is a promising tool, implementing and deploying it while retaining the privacy of end-to-end encryption is challenging.

Comments  (0)

Ad62dd51cf8a9e3d667bcdd92d493ccc

One Encryption Backdoor Is One Too Many

August 11, 2016 Added by:Joe Levy

Although the FBI no longer needs to force Apple to unlock an iPhone that belonged to one of the San Bernardino terrorists, the debate must continue. Strong encryption that cannot be exploited by external or internal actors is a must for any organization.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

Cloud Security Can’t Be Ignored Anymore, Thanks to Millennials

May 09, 2016 Added by:Vanishree Rao

Thanks to digital preferences of millennials, increased digitization and cloudification will drive the demand for cloud security products and services.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

End-to-end Encryption, Today -- Loophole Closed or Moved?

April 22, 2016 Added by:Vanishree Rao

End-to-end encryption does not solve the problem, despite the common perception that it is the holy grail of instant-messaging security. It is necessary that service providers shift their attention toward non-traditional key-derivation mechanisms to close the loophole.

Comments  (0)

0691ab2a89db6dae5b9845dee3dd63a4

Cloud Email Applications Could Put Your Corporate Data at Risk

April 12, 2016 Added by:Yotam Gutman

Third party email cloud application could expose the organizations data since employees now have the ability to grant applications access to their corporate information

Comments  (0)

F08d1219500edcf01d8b56ee28634437

March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Yes. The World Needs More Security Predictions

February 17, 2016 Added by:Dan Lohrmann

With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?

December 21, 2015 Added by:Dan Lohrmann

Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...

Comments  (0)

C492d23f3758cf5cdee0b35b74cc36f1

Why Companies Fail to Secure Their Web Apps

December 14, 2015 Added by:Ilia Kolochenko

The five things that companies do to make hacking into their websites and web applications even easier for the hackers.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part I)

December 01, 2015 Added by:Steve Durbin

Organizations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »