Despite advances in data security, many of the world’s largest companies still fall prey to data breaches. Troy Hunt, the founder of Have I Been Pwned, tells us how these breaches occur, how stolen data is used, its impact on corporations and individuals, and most importantly – gives us the tools to know if our...
Now that U.S. government agencies are required to migrate to the cloud, they must assure their information remains secure. And with many agencies having dozens, if not hundreds, of systems and limited manpower, manually fulfilling security requirements and continuing to monitor them for compliance is nearly impossible. cFocus Software’s proprietary software ATO (Authority To Operate)...
With the deadline for enforcement of the European Union’s General Data Protection Regulation (GDPR) quickly approaching, businesses engaging with consumers in the EU must implement compliance, or face fines that could potentially bankrupt them. Ensighten’s GDPR Website Compliance tools are designed to help these companies fulfill GDPR requirements regarding the collection, storage, and use of...
“Although GDPR is much better than previous legislation, particularly with regard to enforcement, there’s still some lack of clarity on issues like online tracking. Hopefully this will be dealt with over time. Obviously, it’s not ideal that companies are still stalking users as they surf the internet.” Joe McNamee, Executive Director, EDRi (European Digital Rights)...
I recently sat down with Taha Smily, an independent cybersecurity researcher to talk about the role he and other members of a new generation of ethical hackers play in keeping sites secure. Please tell me a little bit about yourself and how you got involved in cybersecurity research. My name is Taha Smily; I’m an...
Today’s companies spend a lot of money on technology and devices to keep their information safe from bad actors that intend reputational or financial harm. But no matter how good the technology in place may be, it is imperative that companies set policies assuring that none of their practices inadvertently open a door and release...
As the work environment becomes increasingly mobile, and more devices than ever before are connecting to company networks, security challenges are increasing exponentially.  Rohde & Schwarz Cybersecurity has developed technologies to keep networks secure by isolating sensitive data from the open internet while allowing employees to continue to use their applications without any additional steps...
Dealing with hundreds of unknown files and many false-positives, performing memory analysis, and protecting against fileless malware represent some of the biggest challenges organizations are facing today. Intezer Analyze™ provides rapid malware detection and analysis by breaking down the code of every unknown file and comparing its “genes” to all previously seen code, both legitimate...
Professional attackers wanting to exploit legitimate social media users are mass registering abusive user accounts in ways that they appear legitimate. Trying to detect these abusive accounts individually before they can do any damage is nearly impossible. DataVisor’s proprietary algorithm takes a new approach by analyzing multiple dimensions across multiple accounts and uncovering the hidden...
With employees having access to more sensitive information than ever, companies need the ability to detect and prevent threats from inside, be they through negligence or malicious intent. However, differences between industries and company cultures require more than a one-size-fits-all approach. Teramind provides a totally customizable employee behavior monitoring solution to identify suspicious activity, spot...