Is your team working constantly to discover and patch critical vulnerabilities across your global hybrid-IT landscape? Traditional vulnerability management solutions stop at only identifying vulnerabilities and don’t help with remediation. Security teams would prefer if they can automatically discover and categorize...
The ongoing dispute between the government of India and social media firms over privacy issues heated up this week when WhatsApp filed a lawsuit attempting to block new rules that require the tracing of the origin of certain instant messages.
Where were you on May 25, 2018? That was the day the EU's General Data Protection Regulation went into full effect. Three years later, some legal and privacy experts say that while the global privacy discussion and expectations have evolved, GDPR still has some growing up to do.
As a global CISO and privacy officer, Rebecca Wynn has earned her stripes. And she's upfront with her expectations: She will take your security organization to the next level. But she also won't hesitate to walk away if she sees that cybersecurity commitment is nothing but talk.
The COVID-19 pandemic created unique conditions for technology and surveillance practices to erode global privacy. In this discussion of their RSA Conference keynote, Niloo Howe and David Cole share their research, case studies and analysis.
From identity and access management to cloud migration and connected devices, retired RSA CEO Art Coviello looks beyond the pandemic and says, "It's going to be a Roaring '20s for technology." But he also foresees a potentially calamitous decade for security.
As CISO of Johnson & Johnson, Marene Allison was used to gauging her security posture by the top threat activity: nation-state, cybercrime, insider or hacktivist. But in 2020, they all struck at once. Here is one CISO's take on the state of the industry.
After a year of pandemic resilience and digital transformation, what is the state of global privacy? Ruby Zefo, Uber's chief privacy officer, weighs in on the evolution of privacy, new and emerging legislation and advice for those just starting their privacy careers.
Discover the latest trends to see where risks are growing and how you can defend against them.
Results from the Verizon Mobile Security Index (MSI) 2021 report show that 62% of employees currently work remotely—that’s nearly double pre-pandemic numbers.
With remote workers accessing valuable corporate data...
Some security experts are questioning whether Experian is doing enough to ensure security after a researcher discovered that an API the credit reporting firm uses to allow lenders to check the credit score of prospective borrowers could expose customer's scores.
Password managers can help businesses reduce password fatigue but they don’t solve the inherent administrative challenges associated with onboarding and supporting users at scale. A better approach: why not eliminate passwords altogether with Identity and Access Management Solutions. Learn more in this short...
Law enforcement agencies use forensics tools from Israeli company Cellebrite to gain access to locked mobile devices and extract data. But the creator of encrypted messaging app Signal says he's found vulnerabilities in Cellebrite's tools, raising questions about whether the extracted data can be trusted.
To minimize the risk of exposing data to cyberhreats, enterprises should take a collaborative approach with all the stakeholders to ensure privacy by design along with data classification in this data-driven economy, according to a panel of experts.
Ireland's privacy regulator has launched an investigation into Facebook after personal information for 533 million of the social network's users appeared for sale online. It will analyze whether Facebook violated the country's data protection law or the EU's General Data Protection Regulation.
To help mitigate the risks of state-sponsored cyberattacks against India's critical infrastructure - and improve detection and response - requires industry collaboration and information sharing, root cause analysis with specialized forensics, and better testing of code, a panel of experts says.