Multilayered Security Gets Personal

Data Breach Today

First Data's Tim Horton on Why Encryption Is Not Enough to Secure PII When large-scale data breaches started to proliferate more than a decade ago, security leaders called for end-to-end data encryption.

Securing Sensitive Data in Pivotal Cloud Foundry

Thales eSecurity

The Cloud Security Challenge. According to the 2019 Thales Data Threat Report -Global Edition, some 90 percent of 1,200 responding data security professionals worldwide report their organizations are using the cloud. 2] 2019 Thales Data Threat Report. Data securit

Cloud 106

The Changing Face of Data Security in Federal Government

Thales eSecurity

In the interview, I point out why data protection must be a shared responsibility that includes robust encryption and authentication tools. People have to place controls closer to their data. They have to enforce these controls that are defined by them by encrypting the data.”.

Allure Security: Protecting Data

Data Breach Today

CEO Mark Jaffe on How to Protect What the Adversaries Really Want Mark Jaffe is less concerned about how adversaries breach networks, but more concerned about how to secure their actual target - critical data. His startup company, Allure Security, intends to help secure that data

Best Practices for Device Security

Data Breach Today

Steve Hyman of Ordr on the Importance of Network Visibility As healthcare providers connect more and more devices to their networks, ensuring data security becomes far more complex, says Steve Hyman of Ordr, who describes best practices

Democratic Senators Introduce Data Security Legislation

Data Breach Today

Separately, Digital Rights Group Pushes for National Privacy Law Democratic senators have introduced yet another version of data security legislation that would create a federal breach notification requirement.

What the Marriott Breach Says About Security

Krebs on Security

Or a previously unknown security flaw gets exploited before it can be patched. They’re reshuffling the organizational chart so that people in charge of security report to the board, the CEO, and/or chief risk officer — anyone but the Chief Technology Officer.

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales eSecurity

The ability to narrow the gap between taking advantage of digital transformation without compromising security was a reoccurring theme at our 2019 annual Data Security Summit on May 1. The discussion was wide ranging, but repeatedly came back to the necessity of data security.

Reducing data security complexity: Avoiding endpoint bloat

Information Management Resources

Devices can have 10 or more endpoint security agents, and still, 70 percent of breaches originate on the endpoint and 100 percent of devices will experience an encryption failure within a year. Data security Cyber security Data management

Government Shutdown: Impact on Health Data Security, Privacy

Data Breach Today

HIPAA Enforcement Agency Open, But Regulatory Activity Slows Down Some regulatory activity related to health data privacy and security is on hold as a result of the partial government shutdown.

BYOE offers Data Security and Compliance in the Cloud

Thales eSecurity

We are seeing more organizations use a ‘lift and shift’ policy, where data is moved to the cloud to satisfy project requirements. But safe migration to the cloud requires that the process be secure, compliant and easy to implement. Data security

Securing your data: The crown jewels of your enterprise

Information Management Resources

Typically, most organizations build security around infrastructure, network and applications. But with data leakage becoming more prevalent, organizations are now considering data to be their crown jewel. Data security Cyber security Cyber attacks

Securing Devices While Maintaining Functionality

Data Breach Today

Chris Hickman of Keyfactor on Managing Medical Device Life Cycles Chris Hickman of Keyfactor explains the challenges of securing and protecting medical devices and the data they collect while delivering the functionality that users demand

Security at the Speed of the Cloud

Data Breach Today

McKinsey CISO Dan Fitzgerald on DevSecOps and the Future of Cloud Security Migrating from on-premises data security to the cloud and then embedding security in the application development process are common challenges for enterprises.

Cloud 232

Seven Microservices Identity Questions to Secure your Data

Thales eSecurity

Data security is a complex subject, and, unfortunately, microservices only add to the complexity. So, in this and my next few blogs, I will share some questions you might want to ask as you go about securing your data in a microservices environment. Data security.

Secur Solutions Group data leak exposes 800,000 Singapore blood donors

Security Affairs

Secur Solutions Group data leak – Another clamorous data leak made the headlines, personal information of 808,201 blood donors in Singapore was exposed online. The database did not contain other sensitive data or other medical info.

Securing data in the hybrid cloud

Thales eSecurity

To protect their customers, their intellectual property, their reputations and their share prices, enterprises need best practice data security that is easy to use throughout this integrated environment. But what about security? Data security

Cloud 86

The Pyramid Hotel Group data leak exposes 85GB of security logs of major hotel chains

Security Affairs

vpnMentor researches have recently discovered that hotel brands managed by The Pyramid Hotel Group have suffered a data leak. Unsecured data also include personally identifying information (PII) of employees. SecurityAffairs – Pyramid Hotel Group, data leak ).

Data Loss, Leakage Top Cloud Security Concerns

Dark Reading

Compliance, accidental exposure of credentials, and data control are also primary concerns for senior IT and security managers

Securing Data in the Digital Transformation Era

Thales eSecurity

Data breaches are the new normal. According to our 2018 Global Data Threat Report , 67% of enterprises have been breached, with that percentage rate growing every year. Today, the vast majority of enterprises (94%) are using sensitive data in cloud, big data, IoT or mobile environments.

3 steps to taming data security challenges with edge computing

Information Management Resources

New touchpoints that were previously isolated and increased connectivity can create new threats, including loss of data integrity and network vulnerabilities allowing for potential ransomware attacks. Data security Data strategy Cyber security

Healthcare Security: Tactics for Reducing Risk

Data Breach Today

IBM's Christopher Bontempo on Where to Focus for Quick Results Reducing risk is a tall order, but IBM's Christopher Bontempo says healthcare security leaders can get immediate and measurable results by concentrating on two aspects: data security and incident response

Risk 163

Data-Centric Security and Big Data

Thales eSecurity

As Cybersecurity continues to be heavily focused on solving the problem of attacks against software vulnerabilities and system access, one potential silver bullet in the data breach equation remains out of the limelight. The Big Data Conundrum. Data security

What You Should Know About the Equifax Data Breach Settlement

Krebs on Security

Big-three credit bureau Equifax has reportedly agreed to pay at least $650 million to settle lawsuits stemming from a 2017 breach that let intruders steal personal and financial data on roughly 148 million Americans. A Little Sunshine Security Tools Equifax Breach Settlement Q&A

Congressional Report Rips Equifax for Weak Security

Data Breach Today

Android 7.0+ Phones Can Now Double as Google Security Keys

Krebs on Security

and higher can now be used as Security Keys , an additional authentication layer that helps thwart phishing sites and password theft. But Google said starting this week, any mobile phone running Android 7.0+ (Nougat) can serve the same function as a USB-based security key.

How Not to Acknowledge a Data Breach

Krebs on Security

But occasionally I feel obligated to publish such accounts when companies respond to a breach report in such a way that it’s crystal clear they wouldn’t know what to do with a data breach if it bit them in the nose, let alone festered unmolested in some dark corner of their operations.

Enhancing Security Governance

Data Breach Today

Longtime CISO Vito Sardanopoli on Building an Effective Security Program A formal security program that spells out precise governance components is critical to protecting sensitive data, says Vito Sardanopoli, who served on the U.S.

The Impact of Digital Transformation on Security

Data Breach Today

Kory Daniels of Trustwave on Scaling Security at the Speed of Business Identifying the data gaps in the rapidly expanding attack surface is critical to allow more sophisticated preventive and response capabilities, says Kory Daniels of Trustwave

Satisfying customer convenience without sacrificing data security

Information Management Resources

Customer experience Data security Customer dataHow can we develop solutions that prioritize both without creating frustrations for the end user? These are questions we must explore in order to promote positive growth and innovation.

Salesforce Security Alert: API Error Exposed Marketing Data

Data Breach Today

Kazakhstan Government Intercepting All Secured Internet Traffic

Adam Levin

Under a new directive effective 7/17, the Kazakhstan government is requiring every internet service provider in the country to install a security certificate onto every internet-enabled device and browser. Data Security Government Cybersecurity Technology featured kazakhstan https

Strong security defense starts with prioritizing, limiting data collection

Information Management Resources

Some businesses hold large volumes of personal data because they believe it’s necessary for comprehensive identity and credential verification, but this practice can be risky. Data security Cyber security Cyber attacks Data privacy GDPR

Big Data Analytics: Taking a Predictive Security Stance

Data Breach Today

Carbon Black's Matt Bennet Shares Insights on Making Big Data Meaningful Big data holds the key to moving from a preventive security stance to a more predictive stance, says Matthew Bennett of Carbon Black

Greater data security investments needed for 5G success, warns study

Information Management Resources

But they also think much-improved security will be essential to realizing that potential. Networks Network security Data security

Study 95

The preparedness paradigm: Ensuring data security during natural disasters

Information Management Resources

Natural disasters represent a pressing issue for data centers, in particular when it comes to problems of data security and overall uptime. Disaster recovery Disaster planning Business continuity

IT 85

Using Strategic Data Governance to Manage GDPR/CCPA Complexity

erwin

In light of recent, high-profile data breaches, it’s past-time we re-examined strategic data governance and its role in managing regulatory requirements. for alleged violations of the European Union’s General Data Protection Regulation (GDPR). Strengthen data security.

GDPR 89

Data Storage Security: Best Practices for Security Teams

eSecurity Planet

We outline the key threats to data storage security, best practices for stopping those threats, and data storage security compliance considerations

Essentials of Supply Chain Security

Data Breach Today

Panorays CEO Matan Or-El on an Automated Approach to Defense According to some researchers, up to 61 percent of recent data breaches were a result of a third-party vulnerability.

Audit Identifies Australian Health Sector Security Weaknesses

Data Breach Today

Similar to security deficiencies often found in the U.S. healthcare sector, weak security controls and practices are putting Australian patient data and hospital services at high risk for serious cyberattacks, according to a new government audit