Biometric Security Vendor Exposes Fingerprints, Face Data

Data Breach Today

Researchers Find Open Database for Suprema's BioStar 2 A South Korean company that makes a biometric access control platform exposed fingerprint, facial recognition data and personal information after leaving an Elasticsearch database open, security researchers say.

Big Data Analytics' Role in Security

Data Breach Today

Splunk's Haiyan Song Shares Insights on Addressing Emerging Threats Big data analytics can help security professionals stay ahead of emerging challenges in a rapidly changing threat landscape, says Splunk's Haiyan Song

Allure Security: Protecting Data

Data Breach Today

CEO Mark Jaffe on How to Protect What the Adversaries Really Want Mark Jaffe is less concerned about how adversaries breach networks, but more concerned about how to secure their actual target - critical data. His startup company, Allure Security, intends to help secure that data

Securing Sensitive Data in Pivotal Cloud Foundry

Thales eSecurity

The Cloud Security Challenge. According to the 2019 Thales Data Threat Report -Global Edition, some 90 percent of 1,200 responding data security professionals worldwide report their organizations are using the cloud. 2] 2019 Thales Data Threat Report. Data securit

Cloud 111

Why Healthcare is Moving to Cloud: Data Security

Perficient Data & Analytics

In this series, we will look at some of the major reasons for healthcare organizations moving to the cloud, starting with data security in the cloud. Specialists keep data secure. However, only 7% have experienced any security concerns known to be related to the cloud.

Cloud 78

Multilayered Security Gets Personal

Data Breach Today

First Data's Tim Horton on Why Encryption Is Not Enough to Secure PII When large-scale data breaches started to proliferate more than a decade ago, security leaders called for end-to-end data encryption.

Democratic Senators Introduce Data Security Legislation

Data Breach Today

Separately, Digital Rights Group Pushes for National Privacy Law Democratic senators have introduced yet another version of data security legislation that would create a federal breach notification requirement.

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales eSecurity

The ability to narrow the gap between taking advantage of digital transformation without compromising security was a reoccurring theme at our 2019 annual Data Security Summit on May 1. The discussion was wide ranging, but repeatedly came back to the necessity of data security.

How responsible are cloud platforms for data security?

Information Management Resources

A trustworthy cloud developer should take precautions and improve cloud security the best it can—but how responsible should the developer be for ensuring the integrity of their system? Cyber security Data security Cloud computing

Cloud 63

What the Marriott Breach Says About Security

Krebs on Security

Or a previously unknown security flaw gets exploited before it can be patched. They’re reshuffling the organizational chart so that people in charge of security report to the board, the CEO, and/or chief risk officer — anyone but the Chief Technology Officer.

Health Data Security: The Most Promising Technologies

Data Breach Today

Analytics, artificial intelligence and machine learning are increasingly playing promising roles in healthcare data security, say Ron Mehring, CISO at Texas Health Resources, a large delivery system, and Axel Wirth of Symantec, a technology vendor.

A Sense of Security: Information Overload Leads to Security Oversights

InfoGoTo

What does this excess work mean within the context of information security? Distraction, which often correlates with a lack of priorities and/or discipline, is at the root of many security challenges , and it’s why the Wall Street Journal findings are so telling.

BYOE offers Data Security and Compliance in the Cloud

Thales eSecurity

We are seeing more organizations use a ‘lift and shift’ policy, where data is moved to the cloud to satisfy project requirements. But safe migration to the cloud requires that the process be secure, compliant and easy to implement. Data security

Elevate your data security and investigation potential

OpenText Information Management

To stay competitive and succeed in today’s digital economy, organizations need to be up to date on data security. And if you work with data, it’s valuable to have proven skills in processes like digital investigation, forensic security and data risk management.

Risk 56

Data leak exposes sensitive data of all Ecuador ‘citizens

Security Affairs

Experts discovered a huge data leak affecting Ecuador, maybe the largest full-country leak, that exposed data belonging to 20 million Ecuadorian Citizens. “ vpnMentor’s research team has found a large data breach that may impact millions of individuals in Ecuador.

Data 93

Best Practices for Device Security

Data Breach Today

Steve Hyman of Ordr on the Importance of Network Visibility As healthcare providers connect more and more devices to their networks, ensuring data security becomes far more complex, says Steve Hyman of Ordr, who describes best practices

Fixing IoT Leaks with Hardware Security

Data Breach Today

Brian Romansky of Owl Cyber Defense Discusses the Role of Data Diodes Data diodes provide a way to control data flows in IoT devices, says Brian Romansky of Owl Cyber Defense, who describes "unhackable" hardware

IoT 185

Securing Data in the Digital Transformation Era

Thales eSecurity

Data breaches are the new normal. According to our 2018 Global Data Threat Report , 67% of enterprises have been breached, with that percentage rate growing every year. Today, the vast majority of enterprises (94%) are using sensitive data in cloud, big data, IoT or mobile environments.

Government Shutdown: Impact on Health Data Security, Privacy

Data Breach Today

HIPAA Enforcement Agency Open, But Regulatory Activity Slows Down Some regulatory activity related to health data privacy and security is on hold as a result of the partial government shutdown.

Seven Microservices Identity Questions to Secure your Data

Thales eSecurity

Data security is a complex subject, and, unfortunately, microservices only add to the complexity. So, in this and my next few blogs, I will share some questions you might want to ask as you go about securing your data in a microservices environment. Data security.

Securing data in the hybrid cloud

Thales eSecurity

To protect their customers, their intellectual property, their reputations and their share prices, enterprises need best practice data security that is easy to use throughout this integrated environment. But what about security? Data security

Cloud 84

Imperva Alerts Customers About 'Security Incident'

Data Breach Today

Data for Certain Users of Cloud Web Application Firewall Exposed Security firm Imperva is notifying some of its Cloud Web Application Firewall customers about a "security incident" that exposed certain data, CEO Chris Hylen reports in a blog post.

Cloud 160

Payments and Security: Putting security where your money is

Thales eSecurity

This troubling reality, one of many findings in the 2019 Thales Global Data Threat Report , provides a stark look at the state of payments security – and leaves a lot of data vulnerable. Just ask any one of the estimated 3 billion people who fell victim to Yahoo’s data crisis.

Capital One Data Theft Impacts 106M People

Krebs on Security

Federal prosecutors this week charged a Seattle woman with stealing data from more than 100 million credit applications made with Capital One Financial Corp. Thompson on suspicion of downloading nearly 30 GB of Capital One credit application data from a rented cloud data server.

Data 243

Data-Centric Security and Big Data

Thales eSecurity

As Cybersecurity continues to be heavily focused on solving the problem of attacks against software vulnerabilities and system access, one potential silver bullet in the data breach equation remains out of the limelight. The Big Data Conundrum. Data security

Web/Mobile App Security: What's 'Good Enough?'

Data Breach Today

Paul Dant of Arxan on Measuring Application Defenses How do organizations know if their app and network security is sufficient to protect them from data breaches - or if their defenses are even working? Paul Dant of Arxan talks about the evolution of mobile/web app security

Secur Solutions Group data leak exposes 800,000 Singapore blood donors

Security Affairs

Secur Solutions Group data leak – Another clamorous data leak made the headlines, personal information of 808,201 blood donors in Singapore was exposed online. The database did not contain other sensitive data or other medical info.

Security at the Speed of the Cloud

Data Breach Today

McKinsey CISO Dan Fitzgerald on DevSecOps and the Future of Cloud Security Migrating from on-premises data security to the cloud and then embedding security in the application development process are common challenges for enterprises.

Cloud 219

Ransomware Bites Dental Data Backup Firm

Krebs on Security

PerCSoft , a Wisconsin-based company that manages a remote data backup service relied upon by hundreds of dental offices across the country, is struggling to restore access to client systems after falling victim to a ransomware attack.

SEC Investigating Data Leak at First American Financial Corp.

Krebs on Security

Securities and Exchange Commissio n (SEC) is investigating a security failure on the Web site of real estate title insurance giant First American Financial Corp. In its letter, the SEC asked Shoval to preserve and share any documents or evidence he had related to the data exposure.

Data 214

Beyond the China Personal Information Security Specification

InfoGoTo

On June 13, 2019, the Cyberspace Administration of China published draft Measures on Security Assessment of the Cross-Border Transfer of Personal Information. What Is the China Personal Information Security Specification? Security Assessments. Data Breaches.

Salesforce Security Alert: API Error Exposed Marketing Data

Data Breach Today

Android 7.0+ Phones Can Now Double as Google Security Keys

Krebs on Security

and higher can now be used as Security Keys , an additional authentication layer that helps thwart phishing sites and password theft. But Google said starting this week, any mobile phone running Android 7.0+ (Nougat) can serve the same function as a USB-based security key.

Data Loss, Leakage Top Cloud Security Concerns

Dark Reading

Compliance, accidental exposure of credentials, and data control are also primary concerns for senior IT and security managers

How Not to Acknowledge a Data Breach

Krebs on Security

But occasionally I feel obligated to publish such accounts when companies respond to a breach report in such a way that it’s crystal clear they wouldn’t know what to do with a data breach if it bit them in the nose, let alone festered unmolested in some dark corner of their operations.

4 top data security and risk trends, according to Gartner

Information Management Resources

It’s an increasingly difficult challenge for many IT and security executives. One good practice is to stay up on the latest cyber security trends and potential solutions. Data security Data privacy Data strategy

Third-Party Security: Guarding Against Complacency

Data Breach Today

Providence Health Plan's Patients Affected by Dominion National Breach Providence Health Plan says some of its members were among the nearly 3 million individuals affected by a data breach revealed by health plan administrator Dominion National in June.

Three Strategies for Big Data Security

Thales eSecurity

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Big Data is unstructured.

Big Data Analytics: Taking a Predictive Security Stance

Data Breach Today

Carbon Black's Matt Bennet Shares Insights on Making Big Data Meaningful Big data holds the key to moving from a preventive security stance to a more predictive stance, says Matthew Bennett of Carbon Black

Congressional Report Rips Equifax for Weak Security

Data Breach Today