Data Protection

Cyber Insights 2024: Quantum and the Cryptopocalypse

Cyber Insights 2024: Quantum and the Cryptopocalypse 2024-02-27 at 16:46 By Kevin Townsend Quantum computers are coming, and will defeat current PKE encryption. But this cryptopocalypse is not dependent upon quantum computers — it could happen through other means, at any time. The post Cyber Insights 2024: Quantum and the Cryptopocalypse appeared first on SecurityWeek. […]

React to this headline:

Loading spinner

Cyber Insights 2024: Quantum and the Cryptopocalypse Read More »

FTC Accuses Avast of Selling Customer Browsing Data to Advertisers

FTC Accuses Avast of Selling Customer Browsing Data to Advertisers 2024-02-22 at 22:17 By Ryan Naraine European security vendor Avast is charged with harvesting consumer web browsing data through its browser extension and anti-virus software and “and sold it without adequate notice and without consumer consent.” The post FTC Accuses Avast of Selling Customer Browsing

React to this headline:

Loading spinner

FTC Accuses Avast of Selling Customer Browsing Data to Advertisers Read More »

Apple Adds Post-Quantum Encryption to iMessage

Apple Adds Post-Quantum Encryption to iMessage 2024-02-21 at 16:46 By Eduard Kovacs Apple unveils PQ3, a new post-quantum cryptographic protocol for iMessage designed to protect communications against quantum computing attacks. The post Apple Adds Post-Quantum Encryption to iMessage appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Apple Adds Post-Quantum Encryption to iMessage Read More »

Collaboration at the core: The interconnectivity of ITOps and security

Collaboration at the core: The interconnectivity of ITOps and security 2024-02-15 at 07:01 By Help Net Security In this Help Net Security video, Krista Macomber, Research Director at The Futurum Group, discusses how IT and security teams increasingly unite against cyber threats. Organizations are still struggling with the issue of disjointed data protection solutions, leading

React to this headline:

Loading spinner

Collaboration at the core: The interconnectivity of ITOps and security Read More »

French Healthcare Payments Processor Breaches Affect Half of Population

French Healthcare Payments Processor Breaches Affect Half of Population 2024-02-13 at 19:01 By Ryan Naraine France’s data protection agency CNIL says it is investigating massive data breaches at two companies that manage third-party healthcare payments, warning that more than 33 million people may be affected. The post French Healthcare Payments Processor Breaches Affect Half of

React to this headline:

Loading spinner

French Healthcare Payments Processor Breaches Affect Half of Population Read More »

Cohesity to Buy Veritas’ Data Protection Businesses

Cohesity to Buy Veritas’ Data Protection Businesses 2024-02-11 at 14:32 By SecurityWeek News Data security firm Cohesity will buy Veritas’ data protection business, creating a data security and management giant valued at roughly $7 billion. The post Cohesity to Buy Veritas’ Data Protection Businesses appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Cohesity to Buy Veritas’ Data Protection Businesses Read More »

How companies are misjudging their data privacy preparedness

How companies are misjudging their data privacy preparedness 2024-02-09 at 06:31 By Help Net Security In this Help Net Security video, Karen Schuler, Global Privacy & Data Protection Chair at BDO, discusses overconfidence in data privacy and data protection practices. There is an apparent disconnect between tech CFOs’ confidence and consumer perceptions. BDO’s 2024 Technology

React to this headline:

Loading spinner

How companies are misjudging their data privacy preparedness Read More »

Common cloud security mistakes and how to avoid them

Common cloud security mistakes and how to avoid them 2024-02-07 at 08:01 By Helga Labus According to recent surveys, 98% of organizations keep their financial, business, customer and/or employee information in the cloud but, at the same time, 95% of cloud security professionals are not sure their security protections and their team would manage to

React to this headline:

Loading spinner

Common cloud security mistakes and how to avoid them Read More »

How CISOs navigate policies and access across enterprises

How CISOs navigate policies and access across enterprises 2024-02-06 at 08:01 By Mirko Zorz In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection with diverse policies, devices, and access controls in a distributed enterprise. He also highlights the significance of security validations, especially internal

React to this headline:

Loading spinner

How CISOs navigate policies and access across enterprises Read More »

Netherlands Fines Uber Over Data Protection

Netherlands Fines Uber Over Data Protection 2024-02-02 at 13:46 By AFP Dutch regulators impose a 10 million euro ($10.8 million) fine on ride-hailing app Uber for lack of transparency in treating the personal data of its drivers. The post Netherlands Fines Uber Over Data Protection appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Netherlands Fines Uber Over Data Protection Read More »

Budget cuts loom for data privacy initiatives

Budget cuts loom for data privacy initiatives 2024-01-26 at 06:01 By Help Net Security The past year saw developments and updates to privacy regulations across the globe—from India’s Personal Data Protection Bill to Brazil’s General Data Protection Law, according to ISACA. However, only 34% of organizations say they find it easy to understand their privacy

React to this headline:

Loading spinner

Budget cuts loom for data privacy initiatives Read More »

Organizations invest more in data protection but recover less

Organizations invest more in data protection but recover less 2024-01-24 at 06:32 By Help Net Security 92% of organizations will increase 2024 data protection spend, to achieve cyber resilience amidst continued threats of ransomware and cyberattacks, according to Veeam Software. Respondents shared that cyberattacks remain the top cause of outages and that while organizations are

React to this headline:

Loading spinner

Organizations invest more in data protection but recover less Read More »

Outsmarting Ransomware’s New Playbook

Outsmarting Ransomware’s New Playbook 2024-01-18 at 13:17 By Rik Ferguson Encryption is a technological necessity and also a legal safeguard, with importance in both defending against and mitigating the consequences of cyberattacks. The post Outsmarting Ransomware’s New Playbook appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Outsmarting Ransomware’s New Playbook Read More »

Brad Arkin is New Chief Trust Officer at Salesforce

Brad Arkin is New Chief Trust Officer at Salesforce 2024-01-12 at 18:31 By SecurityWeek News Veteran cybersecurity leader Brad Arkin has left Cisco and is joining Salesforce as SVP and Chief Trust Officer. The post Brad Arkin is New Chief Trust Officer at Salesforce appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Brad Arkin is New Chief Trust Officer at Salesforce Read More »

In Other News: WEF’s Unsurprising Cybersecurity Findings, KyberSlash Cryptography Flaw

In Other News: WEF’s Unsurprising Cybersecurity Findings, KyberSlash Cryptography Flaw 2024-01-12 at 16:46 By SecurityWeek News Noteworthy stories that might have slipped under the radar: WEF releases a cybersecurity report with unsurprising findings, and KyberSlash cryptography vulnerabilities. The post In Other News: WEF’s Unsurprising Cybersecurity Findings, KyberSlash Cryptography Flaw appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

In Other News: WEF’s Unsurprising Cybersecurity Findings, KyberSlash Cryptography Flaw Read More »

Dell Urges Customers to Patch Vulnerabilities in PowerProtect Products

Dell Urges Customers to Patch Vulnerabilities in PowerProtect Products 14/12/2023 at 15:23 By Eduard Kovacs Dell is informing PowerProtect DD product customers about 8 vulnerabilities, including many rated ‘high severity’, and urging them to install patches. The post Dell Urges Customers to Patch Vulnerabilities in PowerProtect Products appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Dell Urges Customers to Patch Vulnerabilities in PowerProtect Products Read More »

Opal Security Scores $22M Investment for IAM Technology

Opal Security Scores $22M Investment for IAM Technology 08/12/2023 at 21:46 By Ryan Naraine San Francisco startup gets fresh capital from Battery Ventures to compete in the crowded identity and access management space. The post Opal Security Scores $22M Investment for IAM Technology appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Opal Security Scores $22M Investment for IAM Technology Read More »

Apple Commissions Data Breach Study to Highlight Need for End-to-End Encryption

Apple Commissions Data Breach Study to Highlight Need for End-to-End Encryption 07/12/2023 at 21:16 By Eduard Kovacs A study commissioned by Apple shows that 2.6 billion personal data records were compromised in breaches in the past two years. The post Apple Commissions Data Breach Study to Highlight Need for End-to-End Encryption appeared first on SecurityWeek.

React to this headline:

Loading spinner

Apple Commissions Data Breach Study to Highlight Need for End-to-End Encryption Read More »

Trail of Bits Spinout iVerify Tackles Mercenary Spyware Threat

Trail of Bits Spinout iVerify Tackles Mercenary Spyware Threat 06/12/2023 at 19:03 By Ryan Naraine iVerify, a seed-stage startup spun out of Trail of Bits, ships a mobile threat hunting platform to neutralize iOS and Android zero-days. The post Trail of Bits Spinout iVerify Tackles Mercenary Spyware Threat appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Trail of Bits Spinout iVerify Tackles Mercenary Spyware Threat Read More »

Mine Lands $30M Series B for Data Privacy Tech

Mine Lands $30M Series B for Data Privacy Tech 05/12/2023 at 17:32 By Ryan Naraine Israeli early-stage startup snags financing from Battery Ventures, PayPal Ventures and Nationwide Ventures. The post Mine Lands $30M Series B for Data Privacy Tech appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

Mine Lands $30M Series B for Data Privacy Tech Read More »

Scroll to Top