Protect Ya Neck (and Instagram Pics)
Instagram enabled support for two factor authentication and account verification - giving users an added step to protect their data - in an update to the app this week.
Ryuk Ransomware Goes After the Big Fish
Over the last two weeks attackers have been using the Ryuk ransomware to carry out tailored attacks against large organizations.
Critical Remote Code Execution Vulnerability Identified in Apache Struts
The Apache Software Foundation released patches on Wednesday for a critical vulnerability in Apache Struts - the culprit behind last year's Equifax breach - that could allow attackers to remotely execute code.
Semiconductor Company Awarded $66M in Trade Secret Theft Case
A California jury ruled earlier this month that Elec-Tech International Co., a Chinese competitor of semiconductor company Lumileds, misappropriated trade secrets belonging to Lumileds, and used them to develop ETI's energy efficient LEDs.
What is Role-Based Access Control (RBAC)? Examples, Benefits, and More
Learn about role-based access control (RBAC) in Data Protection 101, our series on the fundamentals of information security.
Finserv Data Security: Key Concerns for Banks & Credit Unions
18 data security professionals address key concerns for banks and credit unions when it comes to securing sensitive information.
How to Safeguard Your Business Data With Encryption
What organizations need to know when it comes to implementing encryption, the function of encryption, and how failing to encrypt data can lead to compromise.
What is Data Integrity? Definition, Types & Tips
Learn about data integrity, data integrity vs. data security, and more in Data Protection 101, our series on the fundamentals of data protection.
Using Dark Web Data and Intelligence to Trace Payment Card Fraud
At Black Hat on Thursday two researchers described how they were able to use intelligence, transactional data, and predictive analytics to help identify payment card fraud victims.
Top Mistakes to Avoid When Building an Enterprise DLP Solution
18 cybersecurity pros weigh in on the considerations companies should make and the mistakes to avoid when building an enterprise data loss prevention solution.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.