Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy

They come in the mail — ominous-looking envelopes that are devoid of branding and obvious marketing embellishments. Plain white, marked with often-unrecognizable return addresses, and relatively thin — the contents of which will spoil your day and cause you to lose yet a bit more faith in humanity. No, it’s not a tax bill; rather, […]

The post Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy appeared first on Security Intelligence.

Continue reading Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy

45 Million Medical Images Left Exposed Online

A six-month investigation by CybelAngel discovered unsecured sensitive patient data available for third parties to access for blackmail, fraud or other nefarious purposes. Continue reading 45 Million Medical Images Left Exposed Online

Take a Data-Centric Approach to Zero Trust to Protect Your Most Critical Assets

In today’s environments, where sensitive data is everywhere, organizations need strong, flexible frameworks such as Zero Trust to ensure business continuity, compliance and customer trust.

The post Take a Data-Centric Approach to Zero Trust to Protect Your Most Critical Assets appeared first on Security Intelligence.

Continue reading Take a Data-Centric Approach to Zero Trust to Protect Your Most Critical Assets

Slowing Data Security Tool Sprawl in a Hybrid Multicloud World

Having centralized visibility and control over the organization’s data security and compliance posture helps security teams take a comprehensive approach to hybrid multicloud data protection.

The post Slowing Data Security Tool Sprawl in a Hybrid Multicloud World appeared first on Security Intelligence.

Continue reading Slowing Data Security Tool Sprawl in a Hybrid Multicloud World

Automated Sensitive Data Leak Detection

The average multinational spends several million dollars a year on compliance, while in highly regulated industries — like financial services and defense — the costs can be in the tens or even hundreds of millions. D… Continue reading Automated Sensitive Data Leak Detection

10 Myths and Misconceptions About Industrial Espionage

Industrial espionage is real, it’s common, and it can be very costly for your organization. Don’t fall for the myths around this serious issue. Start preparing for the threat today.

The post 10 Myths and Misconceptions About Industrial Espionage appeared first on Security Intelligence.

Continue reading 10 Myths and Misconceptions About Industrial Espionage

Enhance Customer Data Privacy and Digital Trust by Avoiding Dark Patterns

Some apps and sites are finding ways to subvert their user interfaces in ways that intentionally manipulate users. These methods are collectively known as dark patterns.

The post Enhance Customer Data Privacy and Digital Trust by Avoiding Dark Patterns appeared first on Security Intelligence.

Continue reading Enhance Customer Data Privacy and Digital Trust by Avoiding Dark Patterns

Take a Proactive Approach to the Darknet Threat

A proactive approach to security and intelligence gathering is the best way to stem the tide of threats and lucrative trading of business-critical data on the darknet.

The post Take a Proactive Approach to the Darknet Threat appeared first on Security Intelligence.

Continue reading Take a Proactive Approach to the Darknet Threat