Advertisement
Top

Tag: Data


Access control, Security

Data watchdog tells off outsourcing giant for scanning staff biometrics despite ‘power imbalance’

February 26, 2024

Via: The Register

A data protection watchdog in the UK has issued an enforcement notice to stop Serco from using facial recognition tech and fingerprint scanning to monitor staff at 38 leisure centers it runs. During an investigation, the Information Commissioner’s Office, Britain’s […]


Privacy protection, Security

Manchester’s finest drowning in paperwork as Freedom of Information requests pile up

December 20, 2023

Via: The Register

Greater Manchester Police (GMP) must clear the backlog of hundreds of Freedom of Information (FOI) Act requests – some years old – or find itself in contempt of court. So says Britain’s data watchdog, the Information Commissioner’s Office (ICO), which […]


Privacy protection, Security

Preserving privacy through advanced encryption techniques

December 18, 2023

Via: Help Net Security

At its core, encryption involves the use of algorithms, mathematical functions that manipulate data into a seemingly random and indecipherable form. This encoded information, referred to as ciphertext, can only be converted back into its original, meaningful state by those […]


Network security, Security

Top 5 Problems Solved by Data Lineage

September 27, 2023

Via: Security Affairs

Data lineage is the visualization and tracking of data as it moves through various stages of its lifecycle. In an age where data drives decisions and fuels innovation, understanding the journey of data from its inception to its final destination […]


Data loss, Threats & Malware

GAO Report Reveals IRS’s Limited Control Over Taxpayer Data Handling

September 18, 2023

Via: SecureWorld

The U.S. Internal Revenue Service (IRS) is entrusted with the vital responsibility of safeguarding sensitive taxpayer information. Recent incidents of potential unauthorized access to or disclosure of this data have raised concerns and prompted a thorough review by the Government […]


Access control, Security

New Research: 6% of Employees Paste Sensitive Data into GenAI tools as ChatGPT

June 15, 2023

Via: The Hacker News

The revolutionary technology of GenAI tools, such as ChatGPT, has brought significant risks to organizations’ sensitive data. But what do we really know about this risk? A new research by Browser Security company LayerX sheds light on the scope and […]


Application security, Security

Study: 84% of Companies Use Breached SaaS Applications – Here’s How to Fix it for Free!

April 24, 2023

Via: The Hacker News

A recent review by Wing Security, a SaaS security company that analyzed the data of over 500 companies, revealed some worrisome information. According to this review, 84% of the companies had employees using an average of 3.5 SaaS applications that […]


Application security, Security

Enterprises remain vulnerable through compromised API secrets

January 20, 2023

Via: Help Net Security

Cybersecurity professionals are frustrated over how much time and attention they must devote to API security and worried that their defenses still need to be improved, according to Corsha. Researchers recently surveyed over 400 security and engineering professionals to learn […]


Privacy protection, Security

Monte Carlo Data Reliability Dashboard helps organizations understand their data reliability

October 28, 2022

Via: Help Net Security

Monte Carlo has released Data Reliability Dashboard, a new functionality to help customers better understand and communicate the reliability of their data. Poor data quality costs companies a tremendous amount of money, impacting over 26% of their revenue according to […]


Mobile, Mobile security

Mobile apps are a privacy nightmare. The Roe decision put them center stage

July 14, 2022

Via: CSO Online

When news broke on June 24th that the U.S. Supreme Court had officially reversed Roe v. Wade, declaring that the constitutional right to abortion no longer exists, privacy advocates almost immediately began to ring alarm bells. The right to an […]


Application security, Security

Empower Your Security Operations Team to Combat Emerging Threats

July 7, 2022

Via: Dark Reading

The implementation of defense-in-depth architectures and operating system hardening technologies have altered the threat landscape. Historically, zero-click, singular vulnerabilities were commonly discovered and exploited. The modern-day defensive posture requires attackers to successfully chain together multiple exploit techniques to gain control […]


Editorial

Why Your Business Needs A VPN

April 20, 2022

Via: Nakisani Jacobs

Today’s businesses, regardless of size, are vulnerable to hacking and data theft, which can result in significant financial loss. A virtual private network (VPN) uses advanced technology to protect your business data and keep you safe from online threats. A […]


Data loss, Threats & Malware

Despite large investments in security tools, organizations are not confident they can stop data exfiltration

October 29, 2021

Via: Help Net Security

An Osterman Research survey of 255 cybersecurity professionals (CIOs, IT managers, CISOs and security managers), exploring attitudes and perceptions surrounding data exfiltration. Most notably, the research reveals data exfiltration remains a significant threat and despite large investments in security tools, […]


Privacy protection, Security

Your data, your choice

August 27, 2021

Via: Help Net Security

In 2021, “personal data” is anything but “personal”. We don’t own our personal data and we have limited control over what happens to it. Currently, the onus of responsibility on how to use, protect, sell and leverage our personal data […]


Privacy protection, Security

Consumers are increasingly concerned about online security and imminent attacks

July 28, 2021

Via: Help Net Security

According to a new Sophos Home survey, forty-five percent of consumers say they’re more at risk of being hit by an attack now than they were before the pandemic, and 61% believe their household could be the target of an […]


Privacy protection, Security

Data-localization policies are spreading rapidly around the world

July 26, 2021

Via: Help Net Security

The global economy increasingly depends on data flowing freely across borders, yet the number of nations with regulatory barriers preventing that from happening has nearly doubled in four years—from 35 countries in 2017 to 62 now, according to a new […]


Privacy protection, Security

Vaccinate your data: Addressing and adapting to new data risks

July 19, 2021

Via: Help Net Security

It seems like only yesterday that we were all reading up on what the implementation of the European Union’s General Data Protection Regulation (GDPR) would mean for businesses operating in (or handling data collection with organizations in) the EU. For […]


Email security, Security

Gone phishing: workplace email security in five steps

October 6, 2020

Via: Naked Security

How many work emails have you sent and received today? Despite the rise of workplace chat and instant messaging apps, for many of us email continues to dominate business communications both internally and externally. Unfortunately, email is also the most […]


Mobile, Network security, Privacy protection, Security

Recommendations to enhance subscriber privacy in 5G

September 4, 2020

Via: Help Net Security

There are clear benefits of 5G SIM capabilities to protect the most prominent personal data involved in mobile communications, according to the Trusted Connectivity Alliance. Addressing privacy risks The IMSI, known as a Subscription Permanent Identifier (SUPI) in 5G, is […]


Threats & Malware, Virus & Malware

Malware attacks abusing machine identities grew 8x over the last 10 years

August 6, 2020

Via: Help Net Security

Commodity malware campaigns utilizing machine identities are increasing rapidly, according to threat analysis from Venafi. For example, malware attacks using machine identities doubled from 2018 to 2019, including high-profile campaigns such as: TrickBot, Skidmap, Kerberods and CryptoSink. Researchers gathered data […]