Unstructured data stores - text documents, excel spreadsheets, emails, pdfs and more - store untold volumes of personal and customer data. And as privacy and data protection regulations like the GDPR, CCPA, and NYDFS come into the spotlight, it's more important than ever to implement a privacy-centric approach to data...
First American Mortgage Corp., the title insurance company that left hundreds of millions of personal documents exposed on the internet, is now facing a lawsuit and an inquiry by New York's financial regulator. The company is also offering free credit monitoring for anyone who used its title and settlement services...
Today's economy is one of constant change. New opportunities, competitors and
risks emerge regularly. To stay competitive and capitalize on new opportunities in the digital economy, every
organization needs to shift to an agile and innovative mindset. That means rethinking
how companies operate, changing processes...
Traditional storage has become the weak link in the data center. From the perspective of input/output-operations-persecond (IOPS), disk-based storage hasn't kept pace with compute or network IOPS - putting the entire data center stack out of balance. This will remain true until IT shifts its storage technology from...
Security is a journey not a destination. What's been deployed today may be found
to have a vulnerability tomorrow. Operating systems like Windows Server 2003 and
2008, which were once trusted building blocks for critical applications, are now
potential liabilities as time goes on and maintenance comes to an end and...
Deep learning opens up new worlds of possibility in AI, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up.
Read this MIT Technology Review custom paper to learn how advanced AI...
Although the government has been slower than the private sector to adopt the cloud, there's no doubt that the shift is underway. IDC says "Cloud First" will become the new mantra for enterprise IT, noting that the major innovations taking place in IT today are not possible without the cloud as a foundation.
By...
In the age of GDPR, more organizations are looking to data classification - including more automated techniques for doing so - as a way to not only help them protect their crown jewels, but in the case of a breach quickly identify what went missing, says Digital Guardian's Tony Themelis.
A computer security researcher has discovered a vast marketing database containing 340 million records on U.S. consumers. The database is the latest in a long line of databases to have been left exposed to the internet without authentication, thus putting people's personal data at risk.
In a reversal, chipmaker AMD is now warning that its chips are susceptible to the speculative execution flaws in microprocessors known as Spectre, but not to the Meltdown. Separately, Intel has confirmed that its firmware updates have led to stability problems for older Broadwell and Haswell processors.
Following the alert over Meltdown and Spectre vulnerabilities, the U.K. Information Commissioner's Office is warning that failures to patch today could be punished with fines under GDPR once enforcement of the data protection law begins later this year.
The latest statistics on data center breaches show that perimeter firewalls are still not impenetrable. But what cyber criminals count on is what they will find beyond the perimeter - a hardware-centric security model that has remained unchanged for years.
Download this whitepaper and learn:
Why micro-segmentation...
Traditional perimeter-centric data center security strategies are no longer effective against today's malicious and highly sophisticated attacks. While tremendous effort, resources, and technology are applied to securing the perimeter of the data center, until recently, nothing resembling that same level of thought...
Hardware-centric networks are not able to keep up with the demands of business today, not to mention the growing security threats that exist. Read this solution overview to discover how implementing a network virtualization solution for your business will make your life easier.
Enable networking and security at...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.