Sensitive & secret data News
March 03, 2017
Cloudflare security researchers continue investigations as CEO calms fears over potential exposure of sensitive personal data by the Cloudbleed bug, though doubts remain.
February 24, 2017
The Cloudflare bug in CDN is fixed after causing sensitive customer data to leak. Google Project Zero discovered the flaw, and users were warned to change passwords.
February 10, 2017
The NSA contractor accused of stealing elite cyberweapons over the course of 20 years, but his connection to the Shadow Brokers auction of similar hacking tools is still unclear.
January 06, 2017
The threat of ransomware continues to evolve, with a new spin on extortionware, called doxware, that's designed to target and potentially expose sensitive data of ransomware victims.
Sensitive & secret data Get Started
Bring yourself up to speed with our introductory content
As data is increasingly stored in the cloud, it's difficult to maintain a DLP strategy if you're faced with poor data visibility. Find out how you can harness cloud to improve the process. Continue Reading
Ensuring security in big data implementations remains a problem for most enterprises. Learn about the reasons why this is, and how your company can protect sensitive data. Continue Reading
Doxware, also known as extortionware, is an exploit in which the attacker accesses the target's sensitive data and threatens to publish it if the victim does not meet his demands. Continue Reading
Evaluate Sensitive & secret data Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
ISAOs are a good way for organizations to share information about security threats. Expert Steven Weil explains what these organizations are and their attributes. Continue Reading
IoT can be a strong component to ensure compliance with privacy regulations, creating a contextual perimeter for your data and your organization. Continue Reading
Expert contributor Karen Scarfone examines the best email security gateways to help readers determine which may be best for their organization. Continue Reading
Manage Sensitive & secret data
Learn to apply best practices and optimize your operations.
Data anonymization techniques are designed to preserve privacy of shared data, but do they work with high-dimensional data? Here's what experts have to say. Continue Reading
Maintaining the security principle of least privilege can prevent abuse of privileged user accounts. Learn about the best practices for monitoring privileged access. Continue Reading
Endpoint security threat prevention tools are crucial in your endpoint management strategy. This three-part technical guide will help you develop and advance your existing endpoint security management approach. It includes a chapter that outlines seven fundamental steps to take to make sure endpoints entering your network are kept as secure as possible. Chapter two advises on how to raise that endpoint security baseline even higher by using network access control, data loss prevention and strategic data destruction. Our final chapter considers where a cloud service fits into an enterprise security strategy focused on endpoints.
This guide is created with today's enterprise infosec pro in mind, the person on the frontlines -- that is, the corporate IT department -- in the battle against the hackers aiming to steal corporate data and infiltrate enterprise networks. Readers of this guide will come away with a better understanding of the latest tools and techniques to provide better endpoint security threat prevention.Continue Reading
Problem Solve Sensitive & secret data Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Microsoft bolstered the data loss prevention features in Office 365 to protect more than just email. Learn how to expand DLP protection to SharePoint and OneDrive. Continue Reading
A recent Cloudflare bug highlights CDN security and the need for vigilance in protecting sensitive enterprise data. Expert Dave Shackleford discusses the flaw and what can be done. Continue Reading
Protecting a user's digital privacy across different technologies requires a plethora of tools. Expert Matthew Pascucci explores the different ways to protect sensitive data. Continue Reading