Data Protection


A new report from email security firm Tessian examines the state of data loss in organizations. This report reveals that nearly half of employees (48%) are less likely to follow safe data practices when working from home. The State of Data Loss Prevention 2020 report reveals how the global shift to remote working poses […]

Report: Why DLP Has Failed and What the Future Looks ...


New solution addresses growing enterprise public key infrastructure (PKI) requirements and digital identity security risk AUSTIN, Texas, May 11, 2020 – HID Global, a worldwide leader in trusted identity solutions, and Keyfactor, a provider of secure digital identity management solutions, today announced a collaboration that will improve how organizations secure data and […]

HID’s IdenTrust and Keyfactor Collaborate to Solve Enterprise Digital Certificate ...


To be sure, contact tracing for infectious diseases is not new. This practice is vital for combating contagious viruses and has been around for a very long time, so why the controversy about it now? In bygone eras, if you were afflicted with an infectious disease, you would likely sit […]

Contact Tracing and Privacy



One of the notable perks for a journalist covering the security industry is the occasional opportunity to test and review security products and solutions. Over the last couple of weeks, I have had the chance to try three products from Kingston Technology and I am happy to provide Brilliance Security […]

Device Review – Kingston DataTraveler and Nucleum Devices


By Ian Lancaster, founder and former managing director of Reconnaissance International and lead author and editor of ‘Physical to Digital: A Revolution in Document Security’ A revolution is underway in the secured document field. Society is migrating from using physical secured documents, such as banknotes and identity cards, to the […]

Digital Document Revolution: A Cautionary Note


Despite notable investments in Privileged Access Management (PAM) technologies, privileged accounts are still overexposed. Historically, PAM providers have focused on controlling access to accounts and their passwords, not on the activities an administrator needs to perform. The result is an excess of privileged accounts and privileged access control groups with […]

A Task-Based Approach to Privileged Access Management



The use of encryption to protect against cyber threats is growing exponentially. Unfortunately, cybercriminals also leverage encryption to hide malware, ransomware, and other attacks.  Industry analyst firm Omdia estimates that as much as 70–80% of enterprise inbound network traffic is now encrypted, which is up approximately 20% from three years ago. As […]

Analyzing Encrypted Network Traffic


The Department of Defense (DoD) is taking new measures to increase IT security. To protect against cybercrime from all sources, the DoD has worked on a new standard for its contractors. The result is the Cybersecurity Maturity Model Certification (CMMC). The government’s made an effort to improve national cybersecurity for some […]

DoD Implements Cybersecurity Regulation to Protect Against Data Breaches


As millions of workers move from the confines of their employer’s network to apply safe physical distancing measures by working from home, securing data gets more complicated. Providing adequate protection for your critical data can be even more challenging if your VPN just wasn’t designed for the level of traffic […]

The Importance of Extending Your Security Policies to the Cloud




Yesterday, DivvyCloud, a leading provider of security and compliance automation for cloud and container environments, released its 2020 Cloud Misconfigurations Report. Today, the most circulated security news story is about the personal data of more than 10 million people exposed in a breach of MGM’s cloud servers. The MGM hack […]

Breaches Caused by Cloud Misconfigurations on the Rise