Data Protection February 12, 2016 Who Needs to Know? Fine-Grained Access Control Can Protect Data Privacy 3 min read - Fine-grained access controls such as the ones included in IBM Guardium products may be just the thing needed to enhance data privacy.
Cloud Security February 2, 2016 Tor: What Lies Beneath the Onion’s Skin 3 min read - Many people have heard of Tor, or The Onion Router, but how many actually know the details of this privacy tool and how it came to be?
January 26, 2016 The Tor Project Raises $200K Through Crowdfunding 2 min read - The Tor Project recently announced that it raised more than $200,000 from thousands of donors, enabling the company to launch new initiatives.
Data Protection December 8, 2015 The Million-Dollar Data Privacy Question: Is Your Data Secure? 3 min read - New legislation in the European Union will change the way organizations handle data privacy and compliance. Here's what your organization needs to know.
December 1, 2015 Port Fail Vulnerability Exposes Real IP Addresses of VPN Users 3 min read - A vulnerability in the way many VPN providers configure their port forwarding service lets attackers unmask the real IP addresses of users.
Government November 24, 2015 Cybersecurity a Major Topic in 2016 Presidential Election 2 min read - Don't look now, but cybersecurity is lurking as a major issue in the developing presidential election, even if it isn't explicitly spoken about.
Data Protection November 13, 2015 The Role of Deliberate Obfuscation for Overall Data Security and Privacy 2 min read - Deliberate obfuscation could be a viable method for organizations looking to maximize their data security and privacy through more advanced techniques.
November 6, 2015 University Researchers Show How Widely Mobile Apps Share Users’ Personal Information 2 min read - Harvard, MIT and Carnegie Mellon teamed up to show just how much of users' personal information is shared by smartphone applications.
Application Security October 29, 2015 Have Legacy Web Applications Become a Privacy Problem? 2 min read - Many legacy Web applications are still in use, but they need to receive a security overhaul if they are to remain viable in today's world.
CISO October 28, 2015 Phones, Drones and Clones: The Path to Cognitive Privacy 3 min read - Enterprises and individuals need to take the lead when it comes to security and privacy in today's complex world — just as they have for decades.