Data Masking/Tokenization/Anonymization replaces sensitive information with fictitious data while retaining the original data format. The data masking process lets you continue to work with your data as if it were not encrypted. Databa…
Web Cam Child Exploitation Gang Gets 171 Years in Jail
Final four were sentenced on Friday
Fitbit Vulnerabilities Expose Wearer Data
Flaws allowed access to personal information.
Most Wanted Malware: Banking Trojans Come to the Fore Again
Banking trojans were extensively used by cyber-criminals during August, with three variants appearing in Check Point’s latest Global Threat Impact Index.
Equifax CIO and CSO Retire Amid Confusion Over Patching
Firm now says it was ‘aware’ of bug months before it was patched
OurMine Leaks Huge Cache of Vevo Information Online
The leak contains 3.12TB worth of internal files from the music video giant, containing both benign and sensitive information.
Mobile Insecurity Snowballs in 2017
In the first half of 2017, there were more flaws registered for Android and iOS than all of 2016.
Cost of User Security Training Tops $290K Per Year
Employees spend seven hours a year in training and learning best practices to help keep the business secure.
Average Company Subjected to Hundreds of Daily Web App Attacks
In the second quarter, one company was targeted more than 35,000 times in just one day.
Threat Intelligence Strategies Suffer from Data Overload
86% of organizations believe threat intelligence is valuable to their security mission, but many of them struggle with it.