The Data Breach (Amazon) Bucket List
The leak of data on U.S. veterans this week is just the latest to be tied back to insecure cloud-based storage. What’s going on? Let’s take a look.
South Carolina School District Does the Ransomware Two Step
A South Carolina school district is the latest to do the ransomware two step: assuring parents that data encrypted and held hostage by the criminals wasn’t “accessed” by them. Nice try.
Taking Down an Android Botnet
A collaborative effort among more than half a dozen security and technology companies has disrupted a botnet that was attacking content providers and content delivery networks with compromised Android devices.
Cloud Computing Security Benefits: Infosec Pros Reveal the Top Benefits of the Cloud
22 cloud security experts reveal top benefits cloud computing brings to information security teams today.
Digital Guardian Podcast Episode 12: Machine Learning and Artificial Intelligence: Truth, Lies, and Fiction with Alex Pinto
Niddel chief data scientist and co-founder Alex Pinto joins our latest podcast for a conversation on the myths and realities of two of infosec's top buzzwords.
Where Do Baby Exploits Come From?
As concerns about the privacy and security of mobile devices and communications has increased in the post-Snowden era, the adoption of secure messaging apps backed by strong encryption has spiked. That has made life more difficult for both law enforcement agencies and attackers trying to get access to those messages, to the point that a private company now is offering $500,000 for zero-day exploits for most of the high-profile mobile messaging apps on iOS and Android.
Off to College? First Task: Protect Your Data
Every day, colleges in the U.S. give away or sell all manner of personal information on students under the guise of student “directory information.” The first job of students and parents when arriving on campus should be to opt out of the sharing and protect their data.
Attackers Up Their Game on Mobile Devices
Google has been forced to remove more than 500 apps from the Play Store after researchers discovered that an advertising SDK the apps used contained functionality that enabled it to download malicious code and gather users’ data.
4 Ways Small Businesses Can Improve Cybersecurity at a Low Cost
Cybersecurity is often overlooked at small businesses because it’s viewed as too expensive or difficult for smaller companies. Here are four tips that small businesses can follow to improve their cybersecurity on a budget.
What is Threat Detection and Response? Solutions, Benefits, and More
Learn about threat detection and response tools in Data Protection 101, our series on the fundamentals of information security.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.