The Industry’s Only SaaS-Delivered Enterprise DLP
Our unique approach to DLP allows for quick deployment and on-demand scalability, while providing full data visibility and no-compromise protection.
No-Compromise Data Protection is:
- Cross Platform
- Flexible Controls
By now, you will be aware that the Internet of Things is a thing and that it is an ever-growing network made up of disastrously insecure appliances, vehicles, cameras, and other devices connected to the Internet. What you may not be aware of is that this shadow network is now being used as a weapon to attack web sites with DDoS floods with some of the highest volumes ever seen.
Computer science and security rely on precision for the descriptions of their constructs and concepts. But there are some things that defy description in these realms, and the Yahoo data breach is one of them.
It is time to kill the plaintext Internet. Not next year, not a couple years down the line. Now.
Google has released the long-awaited 7.0 version of Android, known as Nougat, and along with the usual performance and feature improvements, this release also is chock full of security improvements, both for users and developers. Many of the new security features are underneath the surface and won’t be visible to most users, but the changes are significant and should have a major effect on user safety.
Reasonable people can, and often do, disagree about what constitutes a proper public response to a data breach. Some people want immediate and full disclosure of all of the details of the event, while others tend to favor a more measured approach, releasing some information at the beginning and more data as things shake out.
Most people don’t pay a lot of attention to government technical guidance and regulations, which is completely understandable. They’re government regulations, after all. But sometimes, buried deep inside these dense bureaucratic reports, there is some guidance of actual value, and the new authentication guidelines from NIST is one of those rare documents.
The web was designed as an open platform, a way for people and machines to communicate with each other regardless of borders or other barriers. The network’s architects meant for it to remain that way, but over time it has gradually become more segmented, by nations as well as corporations, and that’s to the detriment of users everywhere.
Data breaches come in all shapes and sizes. Some, like the attacks on Target and Home Depot, are big, public, and expensive. Others can be small and quiet, but no less expensive in the long run.
Yesterday saw the release of a new Presidential Policy Directive for government cyber attack response. Read on for more about this milestone in federal cybersecurity policy.