Please turn on your JavaScript for this page to function normally.
face
GE trade secret theft case demonstrates need for document behavior monitoring

A former GE engineer and a Chinese national have been formally charged with 14 counts of economic espionage by the U.S. Department of Justice after stealing trade secrets from …

HDD
A surprising number of used drives sold on eBay hold sensitive data

42% of used drives sold on eBay are holding sensitive data, with 15% containing personally identifiable information (PII), according to Blancco Technology Group. Conducted in …

consumer
Consumers trust banks most with their personal data, 68% still fear identity theft

People trust banks and other financial entities to safeguard their personal data more than other organizations. New nCipher Security research also illustrates how easily that …

user
Where data privacy executives plan to focus their strategies and budgets

Adapting to an increasingly volatile regulatory environment is the top priority for privacy executives, with only approximately four in 10 confident in their current abilities …

mainframe
Mainframe security is top priority for 85% of IT pros yet few are adequately protecting their systems

While 85 percent of companies say mainframe security is a top priority, just 33 percent always or often make mainframe decisions based on security. The “Don’t Let Mainframe …

Microsoft Azure
Microsoft rolls out new security capabilities for Azure customers

Microsoft has announced new security features for customers of its Azure cloud computing service. They are a mix of features for storage and compute services: Advanced Threat …

compliance
79% of organizations want a federal privacy law amid lack of compliance

There is a significant enthusiasm for a federal privacy law amid organizations’ lack of ability to comply with data privacy rules stemming from both mushrooming government …

strategy
As fraud attacks grow more sophisticated, a need for contextual detection strategies increases

Fraudsters are using a complex array of tools to build armies of fake accounts, 74% of all fraudulent accounts are created from desktops, and cloud service provider IP ranges …

vault
Encryption deployment increases as organizations struggle to address compliance requirements

As organizations embrace the cloud and new digital initiatives such as the IoT, blockchain and digital payments the use of trusted cryptography to protect their applications …

tax
45% of taxpayers do not securely store tax documents

Despite almost four in 10 (38 percent) taxpayers saying they are worried they will become a victim of tax fraud or tax identity theft during tax season, 45 percent admit to …

library
How to Marie Kondo your data

By now you’ve heard about Marie Kondo, the author of New York Times bestseller, The Life Changing Magic of Tidying Up, and star of Tidying Up, the new Netflix show that puts …

Android
The privacy risks of pre-installed software on Android devices

Many pre-installed apps facilitate access to privileged data and resources, without the average user being aware of their presence or being able to uninstall them. On the one …

Don't miss

Cybersecurity news