Data Governance Makes Data Security Less Scary


Do you know where your data is? What data you have? Add to the mix the potential for a data breach followed by non-compliance, reputational damage and financial penalties and a real horror story could unfold. Don’t Scream; You Can Protect Your Sensitive Data.

Biometric Security Vendor Exposes Fingerprints, Face Data

Data Breach Today

Researchers Find Open Database for Suprema's BioStar 2 A South Korean company that makes a biometric access control platform exposed fingerprint, facial recognition data and personal information after leaving an Elasticsearch database open, security researchers say.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Big Data Analytics' Role in Security

Data Breach Today

Splunk's Haiyan Song Shares Insights on Addressing Emerging Threats Big data analytics can help security professionals stay ahead of emerging challenges in a rapidly changing threat landscape, says Splunk's Haiyan Song

Avast Stops Using Security Software to Track Browsing Data

Data Breach Today

Czech Anti-Virus Giant Faced Outcry Over Privacy Risks Posed by Data Tracking Anti-virus giant Avast is shuttering Jumpshot, its data-collecting side business that has been funneling detailed internet browsing activity from the company's security products and browser extensions to marketers, after a probe by PCMag and Motherboard found the company was failing to fully anonymize data.

Cloud Security: 'Big Data' Leak Prevention Essentials

Data Breach Today

Big data analytics and search tools give organizations the ability to analyze information faster than ever before.

Allure Security: Protecting Data

Data Breach Today

CEO Mark Jaffe on How to Protect What the Adversaries Really Want Mark Jaffe is less concerned about how adversaries breach networks, but more concerned about how to secure their actual target - critical data. His startup company, Allure Security, intends to help secure that data

Securing Sensitive Data in Pivotal Cloud Foundry

Thales eSecurity

The Cloud Security Challenge. According to the 2019 Thales Data Threat Report -Global Edition, some 90 percent of 1,200 responding data security professionals worldwide report their organizations are using the cloud. 2] 2019 Thales Data Threat Report. Data securit

Cloud 118

How Has FTC Data Security Enforcement Changed?

Data Breach Today

In the wake of a federal appeals court ruling last year vacating a Federal Trade Commission enforcement action against LabMD, the FTC's data security consent orders are becoming far more detailed and rigorous, says former FTC attorney Julie O'Neill

Wacom Tablet Data Exfiltration Raises Security Concerns


Wacom stated that its data collection is done only in aggregate -- but that doesn't fix the issues, according to security experts.

Democratic Senators Introduce Data Security Legislation

Data Breach Today

Separately, Digital Rights Group Pushes for National Privacy Law Democratic senators have introduced yet another version of data security legislation that would create a federal breach notification requirement.

Data Awareness Is Key to Data Security

Dark Reading

Traditional data-leak prevention is not enough for businesses facing today's dynamic threat landscape

Multilayered Security Gets Personal

Data Breach Today

First Data's Tim Horton on Why Encryption Is Not Enough to Secure PII When large-scale data breaches started to proliferate more than a decade ago, security leaders called for end-to-end data encryption.

Nedbank client data compromised in security breach at third-party provider

Security Affairs

Nedbank bank announced on Thursday that a security breach at a third-party supplier has compromised the details of as many as 1.7 Nedbank bank disclosed on Thursday a security breach at a third-party supplier that has compromised the details of as many as 1.7

Health Data Security: The Most Promising Technologies

Data Breach Today

Analytics, artificial intelligence and machine learning are increasingly playing promising roles in healthcare data security, say Ron Mehring, CISO at Texas Health Resources, a large delivery system, and Axel Wirth of Symantec, a technology vendor.

Defense Department Agency Reports Data Breach

Data Breach Today

Defense Information Systems Agency Has a Security Mission A U.S.

The Changing Face of Data Security in Federal Government

Thales eSecurity

In the interview, I point out why data protection must be a shared responsibility that includes robust encryption and authentication tools. People have to place controls closer to their data. They have to enforce these controls that are defined by them by encrypting the data.”.

Cloud Data Security: Who Should Hold the Keys?

Thales eSecurity

Nearly half (48%) of all corporate data is stored in the cloud according to the 2019 Thales Global Cloud Security Study conducted by the Ponemon Institute. The reality is the cloud has created challenges in knowing where data is stored, who has access to it, and how to best secure it.

What the Marriott Breach Says About Security

Krebs on Security

Or a previously unknown security flaw gets exploited before it can be patched. They’re reshuffling the organizational chart so that people in charge of security report to the board, the CEO, and/or chief risk officer — anyone but the Chief Technology Officer.

Cloud Provides a Secure Central Data Hub in Healthcare

Perficient Data & Analytics

Previously , I introduced the cloud’s ability to modernize healthcare data and analytics. This blog outlines cloud as a secure and central data hub. This data requires proper management and analysis to derive meaningful information.

Cloud 69

Own Your Cloud Security

Thales eSecurity

Secure. theme will help to encourage personal accountability and proactive behavior in digital privacy, security best practices, common cyber threats and cybersecurity careers. Who’s responsible for the integrity and confidentiality of the services provided by CSPs and the data therein?

Cloud 119

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales eSecurity

The ability to narrow the gap between taking advantage of digital transformation without compromising security was a reoccurring theme at our 2019 annual Data Security Summit on May 1. The discussion was wide ranging, but repeatedly came back to the necessity of data security.

Securing Data in the Digital Transformation Era

Thales eSecurity

Data breaches are the new normal. According to our 2018 Global Data Threat Report , 67% of enterprises have been breached, with that percentage rate growing every year. Today, the vast majority of enterprises (94%) are using sensitive data in cloud, big data, IoT or mobile environments.

Taking Stock of Your Data Security to Deliver a Happy Holiday Shopping Season

Thales eSecurity

Originally published in Security Magazine on November 20, 2019. The sad truth is that cyber criminals do not take vacations and may be looking at the holidays as yet another opportunity to steal and monetize consumer data. Read the full article in Security Magazine.

Retail 118

Data Loss, Leakage Top Cloud Security Concerns

Dark Reading

Compliance, accidental exposure of credentials, and data control are also primary concerns for senior IT and security managers

Why Healthcare is Moving to Cloud: Data Security

Perficient Data & Analytics

In this series, we will look at some of the major reasons for healthcare organizations moving to the cloud, starting with data security in the cloud. Specialists keep data secure. However, only 7% have experienced any security concerns known to be related to the cloud.

Cloud 78

Government Shutdown: Impact on Health Data Security, Privacy

Data Breach Today

HIPAA Enforcement Agency Open, But Regulatory Activity Slows Down Some regulatory activity related to health data privacy and security is on hold as a result of the partial government shutdown.

BYOE offers Data Security and Compliance in the Cloud

Thales eSecurity

We are seeing more organizations use a ‘lift and shift’ policy, where data is moved to the cloud to satisfy project requirements. But safe migration to the cloud requires that the process be secure, compliant and easy to implement. Data security

Bringing security closer to the data

OpenText Information Management

OpenText also understands that security must be job number one. The company acquired Guidance Software in 2017 and with … The post Bringing security closer to the data appeared first on OpenText Blogs.

Health Data Security: Federal, State Trends for 2020

Data Breach Today

While Congress is unlikely to pass major new national cybersecurity legislation in an election year, federal regulators and state attorneys general will be busy addressing evolving health data privacy and security issues in 2020, predicts attorney Marcus Christian of the law firm Mayer Brown

The Changing Face of Data Security in Australia and New Zealand

Thales eSecurity

The traditional focus on security has been on breach prevention and threat detection but these can only go so far. For organisations going through digital transformation there needs to be a layered approach to security – complimenting these traditional strategies with data protection.In

5G Security

Schneier on Security

The security risks inherent in Chinese-made 5G networking equipment are easy to understand. Since the internet, especially the "internet of things," is expected to rely heavily on 5G infrastructure, potential Chinese infiltration is a serious national security threat.

Think Data Security, Not Endpoint Security

Dark Reading

A strong data protection strategy is essential to protect information as it moves across endpoints and in the cloud

Cloud 79

Secur Solutions Group data leak exposes 800,000 Singapore blood donors

Security Affairs

Secur Solutions Group data leak – Another clamorous data leak made the headlines, personal information of 808,201 blood donors in Singapore was exposed online. The database did not contain other sensitive data or other medical info.

Data-Centric Security and Big Data

Thales eSecurity

As Cybersecurity continues to be heavily focused on solving the problem of attacks against software vulnerabilities and system access, one potential silver bullet in the data breach equation remains out of the limelight. The Big Data Conundrum. Data security

Securing data in the hybrid cloud

Thales eSecurity

To protect their customers, their intellectual property, their reputations and their share prices, enterprises need best practice data security that is easy to use throughout this integrated environment. But what about security? Data security

Cloud 89

Data Storage Security: Best Practices for Security Teams

eSecurity Planet

We outline the key threats to data storage security, best practices for stopping those threats, and data storage security compliance considerations

Best Practices for Device Security

Data Breach Today

Steve Hyman of Ordr on the Importance of Network Visibility As healthcare providers connect more and more devices to their networks, ensuring data security becomes far more complex, says Steve Hyman of Ordr, who describes best practices