Sensitive & secret data News
December 14, 2017
Amazon has built more security functions for S3 buckets after cybersecurity firms uncovered a worrisome trend of IT administrators failing to properly secure them.
December 05, 2017
A keyboard data leak by mobile developer Ai.type exposed millions of personal records through misconfigured MongoDB database settings.
November 30, 2017
Yet another publicly accessible cloud storage bucket exposed government data; this time it was an NSA data leak which included information on an Army intelligence project.
October 31, 2017
"Three may keep a Secret, if two of them are dead." So wrote Benjamin Franklin, in Poor Richard's Almanack, in 1735. Franklin knew a thing or two about secrets, as well as about cryptography, given ...
Sensitive & secret data Get Started
Bring yourself up to speed with our introductory content
HTTP response header configuration files on servers need to be set up properly to secure sensitive data. Expert Judith Myerson outlines how to do this on different types of servers. Continue Reading
Organizations that build their own mobile app stores can make life easier for IT admins tasked with monitoring what apps employees use and keeping them secure. Continue Reading
Visibility in cloud environments has proved challenging for information security executives tasked with protecting sensitive data and other assets. Continue Reading
Evaluate Sensitive & secret data Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The use of secure enclaves in the Microsoft Azure confidential computing update aims to improve cloud storage security. Expert Rob Shapland explains how it works. Continue Reading
Learn how network access control (NAC), data loss prevention (DLP) and robust data destruction tools secure the data in your corporate endpoints against data loss. Continue Reading
Mobile app dev tools provide companies with ways to build and deploy mobile apps more easily. Learn the tool capabilities to examine to select the right software for your company. Continue Reading
Manage Sensitive & secret data
Learn to apply best practices and optimize your operations.
Microsoft offers tools in Office 365 to help administrators manage complicated data compliance regulations. These features can protect the business. Continue Reading
Portnox CEO Ofer Amitai outlines five steps that can help CISOs ensure that their security appliance doesn't turn into just another IoT device. Continue Reading
Most cloud access security brokers offer CISOs a way to set policy and gain better understanding of multiple cloud services and data in use across the enterprise. As CASBs have gained momentum in recent years, use cases for them have expanded. Do these tools fill the gaps around visibility and control of software as a service and other cloud services?
Although cloud service visibility and data leak protection continue to be the biggest drivers, cloud access security brokers can do more than just help with your shadow IT problem and unsanctioned application activity in the cloud.
Organizations are increasingly looking to use cloud access security brokers to identify anomalies in data movement between on-premises and cloud apps as well as multiple cloud services. Malware identification and encryption of data have become important. More enterprises are also beginning to use CASBs or similar intermediary security technologies to provide some level of security policy management for custom identity-as-a-service platforms.
In this issue of Information Security magazine, we look at cloud access security brokers and the best ways to evaluate new models, such as infrastructure as a service and platform security.Continue Reading
Problem Solve Sensitive & secret data Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Many users of the file-sharing website Docs.com were unaware that the sensitive data they uploaded was searchable. Expert Michael Cobb explains how this data leak happened. Continue Reading
A researcher discovered 76 iOS apps containing sensitive user data that were vulnerable to man-in-the-middle attacks. Expert Michael Cobb explains how developers can prevent this. Continue Reading
Microsoft bolstered the data loss prevention features in Office 365 to protect more than just email. Learn how to expand DLP protection to SharePoint and OneDrive. Continue Reading