42% of used drives sold on eBay hold sensitive data, researchers find

Selling your old hard drive on eBay may sound like a good way to squeeze a few extra bucks from unused hardware, but not if you don’t erase the data properly. A combined team of data recovery experts from Blanco and Ontrack have conducted tests o… Continue reading 42% of used drives sold on eBay hold sensitive data, researchers find

Vulnerability Dashboard : Measure your progress to deliver secure apps

Vulnerability Dashboard: Measure security quality of your releases over time
Shiftleft is introducing a new Vulnerability Dashboard — A singular view of application security quality metrics including a list of vulnerabilities bas… Continue reading Vulnerability Dashboard : Measure your progress to deliver secure apps

State agency exposes 3TB of data, including FBI info and remote logins

Oklahoma’s Department of Securities (ODS) exposed 3TB of files in plain text containing sensitive data on the public internet this month. Continue reading State agency exposes 3TB of data, including FBI info and remote logins

Protect the Keys to Your Kingdom With Privileged Access Management

The importance of implementing privileged access management (PAM) is undeniable. But how are organizations doing with actually implementing PAM solutions?

The post Protect the Keys to Your Kingdom With Privileged Access Management appeared first on Security Intelligence.

Continue reading Protect the Keys to Your Kingdom With Privileged Access Management

A New Privacy Frontier: Protect Your Organization’s Gold With These 5 Data Risk Management Tips

The enactment of recent privacy mandates is just the start. A comprehensive data risk management program established before more regulations go into effect is well worth its weight in gold.

The post A New Privacy Frontier: Protect Your Organization’s Gold With These 5 Data Risk Management Tips appeared first on Security Intelligence.

Continue reading A New Privacy Frontier: Protect Your Organization’s Gold With These 5 Data Risk Management Tips

Q2 Appthority Pulse Report Finds Chat Apps Most Popular, Risky & Blacklisted Apps

Today Appthority released our Q2 Enterprise Mobile Security Pulse Report. The report looks at three areas of interest to enterprise mobility and security teams: 1) the most common iOS and Android apps in enterprises, 2) th… Continue reading Q2 Appthority Pulse Report Finds Chat Apps Most Popular, Risky & Blacklisted Apps

GDPR will punish lax mobile security. Are you prepared?

The EU’s General Data Protection Regulation (GDPR) went into effect on May 25, 2018, and companies the world over are now racing to address the new rules and achieve compliance. And they’d better, because the penalties for noncomplianc… Continue reading GDPR will punish lax mobile security. Are you prepared?

Mobile security: Enterprise data via mobile is the next frontier for cyber criminals

2018 will be the year cyber criminals focus on enterprise mobile security weak spots, exploiting them to harvest sensitive information. All organizations face new security challenges as their workers increasingly go mobile and use a rapidly e… Continue reading Mobile security: Enterprise data via mobile is the next frontier for cyber criminals

Data Security Solutions for GDPR Compliance

Enforcement of the new EU General Data Protection Regulation (GDPR) adopted in 2016 starts on May 25, 2018. It requires all organizations that do any business in the EU or that collect or process personal data originating in the EU to comply with the r… Continue reading Data Security Solutions for GDPR Compliance

Three Reasons Why GDPR Encourages Pseudonymization

The General Data Protection Regulation (GDPR) is the European Union’s new data regulation designed to provide individuals with rights and protections over their personal data that is collected or created by businesses or government entities. It u… Continue reading Three Reasons Why GDPR Encourages Pseudonymization