加载中...

Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

More than half of the 5,500 survey respondents said they are likely to be given access to company data beyond the scope of their job requirements.
Sometimes it’s the devil you know that can do the most damage when it comes to data theft. According to psychologists, there are warning signs organizations can heed if they know what to look for.
The missing data was stored on a “password-protected unencrypted desktop computer” that was stolen towards the middle of October.
RSA is rolling out a number of improvements to its DLP suite, designed to allow organizations more control and detections when it comes to managing data loss across the network and managing connected devices, including tablets and smartphones.
Now available for as an playback webcast, Mocana introduces a new technology that protects corporate data within individual apps, without the need for an SDK, access to the source code, or a device-level client/agent.
Quarri Technologies, a firm that focuses on secure browsing sessions, has received $3M in Series B funding from the Houston Angel Network (HAN), which it will use to expand it’s presence in the North American market.
Watch an on demand Webcast from SecurityWeek and Symantec to learn more about this intriguing new malware as we provide further analysis on the latest outbreak findings.
Application Security Inc., released new updates to its product line, keeping to the company’s tradition of making database assessment and management an easily navigated and streamlined process.
MDeX, or Multi-Domain eXchange, was designed to address cross domain data sharing between government organizations.
Oracle Enterprise Manager 12c introduces capabilities that help increase administrator productivity and reduce the on-going costs of IT compliance through automation.

FEATURES, INSIGHTS // Data Protection

Wade Williamson's picture
As malware gets progressively more complex, it’s important to understand how the major players in the malware industry fit together and how these relationships affect the ways that malware is developed, distributed and ultimately used in attacks.
Alan Wlasuk's picture
The joy of a hacker extracting your data is similar to the excitement one experiences playing the mechanical claw arcade machines – the one where you insert a few quarters and grab a toy with a mechanical claw. Picture the hacker running scripts instead of using the arcade game joystick.
Jeff Hudson's picture
As data and applications moving to the cloud and can move from one physical location to another almost instantly, ubiquitous encryption becomes even more important, 2012 is set to be be the year of ubiquitous encryption.
Noa Bar-Yosef's picture
There was never a dull moment in 2011. With all the hacks this year, is it even possible to choose the seven prime hacks of 2011? It’s not an easy task, but let’s take a crack at it.
Chris Poulin's picture
I envision data as an object composed of some sort of universal code, the data, and accompanying properties. To protect the information and code, it could only be run on a system controlled by the data's owner, perhaps using a method similar to public/private key pairs, with everything being encrypted.
Eric Schou's picture
As businesses have increased their reliance on access to data, the volume of that same data has also mushroomed, making accurate data discovery more important than ever.
Jeff Hudson's picture
Data breaches can be costly to a company’s bottom line and its reputation. When data is encrypted, even if it’s exposed to hackers, they can’t do anything without the proper encryption keys and credentials, and accessing the data is nearly impossible.
Eric Schou's picture
Walking the tightrope between data security and the desire for maximum performance is a high-wire act well known to many organizations. Their search for the right mix now prompts them to find the best way to identify users tapping into sensitive databases, while minimizing impact on performance.
Jeff Hudson's picture
Too many IT and risk managers are surprised by security breaches, compromised keys or operational failures that occur from sheer neglect that result when you leave your valuable keys as exposed as a password on a post-it. Hefty, potential fines for failing to comply with regulations are risk enough, but the risks of ignoring these vulnerabilities extend even further.
Marc Solomon's picture
Modern data centers are undergoing a transformation driven by trends such as virtualization, green IT, endpoint growth and externalization, resulting in new risks that demand renewed attention to data center security. So what steps can data center architects take to help protect the modern data center in the face of these risks?

Delivered Twice Each Week, the SecurityWeek Briefing Won't Flood Your InBox, But Will Keep you Well Informed on What's Happening in the Industry, Along with Insightful Columns from Industry Experts.

Privacy: We never sell or share your personal information or email address with any other company and you can unsubscribe instantly at any time.