September 15, 2022
Via: Help Net SecurityThe working landscape has changed forever. Now, with workforces dispersed across hybrid work environments, having the technology to allow employees to operate effectively while staying secure is key for every organization. For the last 33 years, NetSupport Manager has been […]
August 31, 2022
Via: TechRadarThe last few years have had a major effect on many aspects of our lives, not least in the world of work. With the pandemic necessitating a shift to working from home, many of us have had to adapt to […]
August 29, 2022
Via: Help Net SecurityIn 2003, California became the first U.S. state to require and implement a series of data breach notification laws designed to protect against the misuse of residents’ personal information. The more recently enacted California Consumer Protection Act (CCPA) provides two […]
August 25, 2022
Via: Help Net SecurityAvast has launched a Ransomware Shield for businesses, offering organizations an extra layer of protection against ransomware attacks. This will ensure businesses can secure their files and customer data, with proactive protection which prevents unauthorized access. The new feature is […]
Application security, Security
August 11, 2022
Via: Help Net SecurityConcentric AI has launched functionality that protects sensitive data shared as text or attachments across business messaging platforms, including e-mail, Slack and Microsoft Teams. These capabilities, available as part of the Concentric Semantic Intelligence platform, evaluate and manage data security […]
July 8, 2022
Via: Help Net SecurityProtecto brings artificial intelligence and privacy engineering to Snowflake, the Data Cloud company, so that joint customers can identify data protection issues before data breaches and customer trust violations occur. Data is the backbone of today’s businesses, but it is […]
June 29, 2022
Via: Help Net SecurityEnveil released its new encrypted training solution, ZeroReveal ML Encrypted Training (ZMET). The enterprise-ready product extends the boundary of trusted compute by enabling encrypted federated learning and the secure usage of disparate, decentralized datasets for machine learning applications. Designed to […]
June 24, 2022
Via: TechRadarMultiple data privacy advocates have criticised plans in the UK to replace cookie consent pop-ups with an “opt-out model”, which they believe will do more damage than good. In an email exchange with TechRadar Pro, Jon Callas of the Electronic […]
Threats & Malware, Virus & Malware
March 18, 2022
Via: Help Net SecurityVeritas Technologies announced the results of a new study revealing that the majority of organizations are underprepared to face threats against their Kubernetes environments. Kubernetes is being rapidly deployed into mission-critical environments in organizations around the world, the research showed, […]
Data loss, Email security, Security, Threats & Malware
March 14, 2022
Via: Security WeekThe most recent cyberattack – and most impactful – targeted South Denver Cardiology Associates and resulted in the data of more than 287,000 patients being exfiltrated. The Colorado firm identified the attack on January 4 and later discovered that an […]
March 11, 2022
Via: Help Net SecurityThe mobile data protection market is evaluated at $1.949 billion for the year 2019 and is projected to grow at a CAGR of 32.53% to reach a market size of $13.999 billion by the year 2026, according to ResearchAndMarkets. Mobile […]
February 21, 2022
Via: Natalie DunnIn the last few years, two definitions gave entrepreneurs and business managers headaches: security and data protection. There is no security without data protection and no data protection without security. Here’s why these two definitions should always go together. Living […]
February 17, 2022
Via: Help Net SecurityCode42 released a report, conducted by Vanson Bourne, which found that cybersecurity teams are facing unprecedented challenges when it comes to protecting sensitive corporate data from exposure, leak and theft. Identified within the research are three compounding trends increasing the […]
October 29, 2021
Via: Help Net SecurityAn Osterman Research survey of 255 cybersecurity professionals (CIOs, IT managers, CISOs and security managers), exploring attitudes and perceptions surrounding data exfiltration. Most notably, the research reveals data exfiltration remains a significant threat and despite large investments in security tools, […]
Data loss, Privacy protection, Security, Threats & Malware
August 23, 2021
Via: Security WeekThe New York City-based financial services provider has started informing customers that, due to a technical bug, their personal information might have been exposed to other customers. The data was viewable on chase.com or in the Chase Mobile app. Information […]
August 16, 2021
Via: Help Net SecurityNearly two thirds of employees are using personal passwords to protect corporate data, and vice versa, with even more business leaders concerned about this very issue. Surprisingly, 97% of employees know what constitutes a strong password, yet 53% admit to […]
Threats & Malware, Vulnerabilities
August 10, 2021
Via: Security WeekWhile the misconfiguration has been known since at least last year and Salesforce has taken steps to prevent incidents, data security company Varonis says it’s still seeing many affected organizations. Varonis believes thousands of companies could still be vulnerable. Salesforce […]
July 6, 2021
Via: CSO OnlineIn mid-June, Senator Kirsten Gillibrand (D-NY) reintroduced a new version of her bill, the Data Protection Act of 2021, that would create a new independent, executive-level government agency, the Data Protection Agency (DPA). The DPA would “protect Americans’ data, safeguard […]
June 29, 2021
Via: SecurelistThe pandemic and the restrictions that came with it have led to an increase in the popularity of dating apps. For example, the total number of swipes on Tinder increased by 11% last year, with the daily number of swipes […]
June 22, 2021
Via: Security WeekIn a non-binding opinion, the two bodies called for a “general ban” on the practice that would include “recognition of faces, gait, fingerprints, DNA, voice, keystrokes and other biometric or behavioural signals, in any context”. Such practices “interfere with fundamental […]