June 28, 2016 The Fansmitter Method: Stolen Data’s New Sound? 2 min read - Security researchers described a new method of data theft called Fansmitter, which uses cooling fans to slowly exfiltrate information.
Data Protection June 24, 2016 Can You Still Protect Your Most Sensitive Data? 3 min read - Companies in Silicon Valley and beyond are questioning how they should be protecting their sensitive data — if they choose to keep it at all.
Data Protection June 20, 2016 GDPR: How to Prepare in the Calm Before the Storm 3 min read - The General Data Protection Regulation (GDPR) has finally arrived in the EU. Here's what organizations around the world can do to be prepared.
Retail June 10, 2016 Retail Security: Industry Provides Rich Pickings for Cybercriminals 3 min read - Retail security presents a huge challenge for organizations in the industry, but it is essential that they enact a holistic security strategy.
June 9, 2016 Worldwide Worry: New National Exposure Index Ranks Most Hackable Countries 2 min read - The National Exposure Index recently ranked the world's most hackable countries, and the results may surprise security professionals.
Retail June 7, 2016 Retail IT Professionals Feel More Prepared for Data Breaches 3 min read - A recent survey showed that retail IT professionals feel they are prepared for data breaches, though other data doesn't fully support their belief.
June 1, 2016 ‘Perfect’ Data Exfiltration Demonstrated 2 min read - Covert data exfiltration techniques can be perfected with the help of 10 commandments, which were recently laid out by researchers.
May 24, 2016 New Method for Random Number Generation Devised at UT Austin 2 min read - A breakthrough in random number generation has the potential to result in stronger encryption— and, ultimately, improved cybersecurity.
May 23, 2016 117 Million LinkedIn Email Details Hit the Dark Web — Business as Usual? 2 min read - A years-old hack led to more than 117 million LinkedIn email addresses and passwords being posted online — and this isn't the only hack getting headlines.
CISO May 23, 2016 The Relationship: Why Technology Is Only One Part of the Equation 3 min read - In the IT security industry, forging a relationship with the client is just as important to the long-term success of a security program as the tools used.