Data Protection November 25, 2015 Big Data Opportunities Need Big Data Security 3 min read - The adoption of big data analytics is a rapidly growing trend. If you want to reap the benefits of these platforms, you need comprehensive data security.
November 18, 2015 App Developers’ Use of Back-end Cloud Services Puts Sensitive Data at Risk 2 min read - App developers love using BaaS providers to store and host the data they collect from users, but researchers said it puts sensitive data in danger.
Data Protection November 13, 2015 The Role of Deliberate Obfuscation for Overall Data Security and Privacy 2 min read - Deliberate obfuscation could be a viable method for organizations looking to maximize their data security and privacy through more advanced techniques.
November 12, 2015 TalkTalk Hack Could Have a $53 Million Price Tag, Even if Few Customers Are Affected 2 min read - The latest TalkTalk hack could come with a hefty price tag for the Internet service provider — and major security implications for victims.
November 10, 2015 Send in the Devs? Data Breach Prep Demands Team Effort 2 min read - Application developers need to be involved with boardroom executives from the start if companies hope to effectively avoid a data breach.
November 6, 2015 OmniRAT Takes Over Android Devices Through Social Engineering Tricks 2 min read - Cybercriminals could be leveraging remote tools such as OmniRAT to take over Android devices and steal data from unsuspecting victims.
November 4, 2015 Gold Standard? Security Startup Earns $35 Million From Goldman Sachs 2 min read - Security startup iboss just received $35 million in Series A funding from Goldman Sachs — can their anomaly detection offering help Sachs stay relevant?
Data Protection November 2, 2015 From Compliance to Breaches: Managing Data Source Vulnerabilities Is a Big Challenge 3 min read - IBM Security Guardium Vulnerability Assessment can help solve a twofold problem faced by many enterprises: managing compliance and securing data.
Application Security October 29, 2015 Have Legacy Web Applications Become a Privacy Problem? 2 min read - Many legacy Web applications are still in use, but they need to receive a security overhaul if they are to remain viable in today's world.
Data Protection October 28, 2015 Two Important Lessons from the Ashley Madison Breach 5 min read - The Ashley Madison data breach was one of the most notable of 2015 so far, and there are several security lessons buried in the scandalous headlines.