Sensitive & secret data News
September 29, 2017
News roundup: During the Deloitte hack, attackers had access to client data and internal email servers. Plus, the U.S. asks China not to enforce its Cybersecurity Law, and more.
August 03, 2017
Veritas analytics adds Integrated Classification Engine to find sensitive private data that can help organizations comply with the looming General Data Protection Regulation.
July 25, 2017
G Suite security faced similar issues to Amazon Web Services, as misconfigured access permissions could have exposed sensitive information from hundreds of Google Groups.
March 03, 2017
Cloudflare security researchers continue investigations as CEO calms fears over potential exposure of sensitive personal data by the Cloudbleed bug, though doubts remain.
Sensitive & secret data Get Started
Bring yourself up to speed with our introductory content
Organizations that build their own mobile app stores can make life easier for IT admins tasked with monitoring what apps employees use and keeping them secure. Continue Reading
Visibility in cloud environments has proved challenging for information security executives tasked with protecting sensitive data and other assets. Continue Reading
As data is increasingly stored in the cloud, it's difficult to maintain a DLP strategy if you're faced with poor data visibility. Find out how you can harness cloud to improve the process. Continue Reading
Evaluate Sensitive & secret data Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn how network access control (NAC), data loss prevention (DLP) and robust data destruction tools secure the data in your corporate endpoints against data loss. Continue Reading
Mobile app dev tools provide companies with ways to build and deploy mobile apps more easily. Learn the tool capabilities to examine to select the right software for your company. Continue Reading
Keeping IoT data secure requires the proper technology. Reiner Kappenberger of HPE explains how format-preserving encryption, or FPE, can help. Continue Reading
Manage Sensitive & secret data
Learn to apply best practices and optimize your operations.
Portnox CEO Ofer Amitai outlines five steps that can help CISOs ensure that their security appliance doesn't turn into just another IoT device. Continue Reading
Most cloud access security brokers offer CISOs a way to set policy and gain better understanding of multiple cloud services and data in use across the enterprise. As CASBs have gained momentum in recent years, use cases for them have expanded. Do these tools fill the gaps around visibility and control of software as a service and other cloud services?
Although cloud service visibility and data leak protection continue to be the biggest drivers, cloud access security brokers can do more than just help with your shadow IT problem and unsanctioned application activity in the cloud.
Organizations are increasingly looking to use cloud access security brokers to identify anomalies in data movement between on-premises and cloud apps as well as multiple cloud services. Malware identification and encryption of data have become important. More enterprises are also beginning to use CASBs or similar intermediary security technologies to provide some level of security policy management for custom identity-as-a-service platforms.
In this issue of Information Security magazine, we look at cloud access security brokers and the best ways to evaluate new models, such as infrastructure as a service and platform security.Continue Reading
Data anonymization techniques are designed to preserve privacy of shared data, but do they work with high-dimensional data? Here's what experts have to say. Continue Reading
Problem Solve Sensitive & secret data Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Many users of the file-sharing website Docs.com were unaware that the sensitive data they uploaded was searchable. Expert Michael Cobb explains how this data leak happened. Continue Reading
A researcher discovered 76 iOS apps containing sensitive user data that were vulnerable to man-in-the-middle attacks. Expert Michael Cobb explains how developers can prevent this. Continue Reading
Microsoft bolstered the data loss prevention features in Office 365 to protect more than just email. Learn how to expand DLP protection to SharePoint and OneDrive. Continue Reading