Sensitive & secret data News
March 03, 2017
Cloudflare security researchers continue investigations as CEO calms fears over potential exposure of sensitive personal data by the Cloudbleed bug, though doubts remain.
February 24, 2017
The Cloudflare bug in CDN is fixed after causing sensitive customer data to leak. Google Project Zero discovered the flaw, and users were warned to change passwords.
February 10, 2017
The NSA contractor accused of stealing elite cyberweapons over the course of 20 years, but his connection to the Shadow Brokers auction of similar hacking tools is still unclear.
January 06, 2017
The threat of ransomware continues to evolve, with a new spin on extortionware, called doxware, that's designed to target and potentially expose sensitive data of ransomware victims.
Sensitive & secret data Get Started
Bring yourself up to speed with our introductory content
Visibility in cloud environments has proved challenging for information security executives tasked with protecting sensitive data and other assets. Continue Reading
As data is increasingly stored in the cloud, it's difficult to maintain a DLP strategy if you're faced with poor data visibility. Find out how you can harness cloud to improve the process. Continue Reading
Ensuring security in big data implementations remains a problem for most enterprises. Learn about the reasons why this is, and how your company can protect sensitive data. Continue Reading
Evaluate Sensitive & secret data Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Most cloud access security brokers offer CISOs a way to set policy and gain better understanding of multiple cloud services and data in use across the enterprise. As CASBs have gained momentum in recent years, use cases for them have expanded. Do these tools fill the gaps around visibility and control of software as a service and other cloud services?
Although cloud service visibility and data leak protection continue to be the biggest drivers, cloud access security brokers can do more than just help with your shadow IT problem and unsanctioned application activity in the cloud.
Organizations are increasingly looking to use cloud access security brokers to identify anomalies in data movement between on-premises and cloud apps as well as multiple cloud services. Malware identification and encryption of data have become important. More enterprises are also beginning to use CASBs or similar intermediary security technologies to provide some level of security policy management for custom identity-as-a-service platforms.
In this issue of Information Security magazine, we look at cloud access security brokers and the best ways to evaluate new models, such as infrastructure as a service and platform security.Continue Reading
ISAOs are a good way for organizations to share information about security threats. Expert Steven Weil explains what these organizations are and their attributes. Continue Reading
IoT can be a strong component to ensure compliance with privacy regulations, creating a contextual perimeter for your data and your organization. Continue Reading
Manage Sensitive & secret data
Learn to apply best practices and optimize your operations.
Data anonymization techniques are designed to preserve privacy of shared data, but do they work with high-dimensional data? Here's what experts have to say. Continue Reading
Maintaining the security principle of least privilege can prevent abuse of privileged user accounts. Learn about the best practices for monitoring privileged access. Continue Reading
Endpoint security threat prevention tools are crucial in your endpoint management strategy. This three-part technical guide will help you develop and advance your existing endpoint security management approach. It includes a chapter that outlines seven fundamental steps to take to make sure endpoints entering your network are kept as secure as possible. Chapter two advises on how to raise that endpoint security baseline even higher by using network access control, data loss prevention and strategic data destruction. Our final chapter considers where a cloud service fits into an enterprise security strategy focused on endpoints.
This guide is created with today's enterprise infosec pro in mind, the person on the frontlines -- that is, the corporate IT department -- in the battle against the hackers aiming to steal corporate data and infiltrate enterprise networks. Readers of this guide will come away with a better understanding of the latest tools and techniques to provide better endpoint security threat prevention.Continue Reading
Problem Solve Sensitive & secret data Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Microsoft bolstered the data loss prevention features in Office 365 to protect more than just email. Learn how to expand DLP protection to SharePoint and OneDrive. Continue Reading
A recent Cloudflare bug highlights CDN security and the need for vigilance in protecting sensitive enterprise data. Expert Dave Shackleford discusses the flaw and what can be done. Continue Reading
Protecting a user's digital privacy across different technologies requires a plethora of tools. Expert Matthew Pascucci explores the different ways to protect sensitive data. Continue Reading