When it comes to data breach and privacy class actions, plaintiffs will need to prove data was actually misused not just improperly exfiltrated by hackers.
The research from Florida State University and Rutgers University scientists aims to establish a new level of security for voice biometrics and claims that the tech is vulnerable to spoofing.
The Colorado Privacy Act (CPA) passed yesterday in the state's senate and will go into effect in July 2023 – creating an additional regulation that organizations must comply with or face hefty fines and eroding consumer trust.
Enterprise security professionals face a difficult task. The growth of the cybersecurity market has led to increased clutter and overwhelming fragmentation. Before we dig into the tips that enterprise security professionals should keep top of mind when seeking out the right vendor, let’s delve into the primary pain points that buyers face.
As employees return back to the office, challenges continue to unfold and the best way to approach many of the computers and systems that have been off company premises for so long is to regard them as potentially infected.
Like the game of Texas Hold ‘Em, the practice of security is ultimately an exercise in decision-making. Specifically, how do you make the best decision possible with limited and incomplete information?
Rather than be caught off-guard and left to play catch-up, security and IT professionals should begin planning now for the many new and updated regulations, standards and proposed pieces of legislation that will be sweeping over the financial services industry and other sectors in the near future.
Has the pandemic and remote working created an environment of heightened risk of insider data breaches? Here, Darren Cooper, Chief Technology Officer (CTO) for Egress, speaks to Security magazine about what organizations can do to prevent data loss.