Toshiba is trying to make encryption safe, even from prying NSA eyes. The Japanese electronics firm is working on a quantum cryptography system that analysts claimed can't be breached, according to a report by the Wall Street Journal.
Both Target and CVS have bad histories in handling sensitive customer data so what happens when CVS buys Target's pharmacy business?
To improve its ability to offer companies data masking technology, data-as-a-service provider Delphix has acquired Axis Technology Software, a Boston-based data masking provider.
According to a U.S. mobile security study, millennials are a greater risk to corporate data security than other user demographics. The findings between generational behaviors are likely to be counter-intuitive to many who assume younger generations to be more knowledgeable and more aware of security threats in mobile tech use than older generations. So much for gut-instinct, eh?
CoSoSys, a mobile device management and endpoint security firm, is incorporating iBeacon technology into its MDM platform to provide location-based mobile device police enforcement.
Attackers could hack into drones, intercept communications and gain control of the vehicle, posing security, privacy and liability issues for companies employing them, according to a panel of legal and security experts here at the RSA conference.
After touting the data security benefits of "opportunistic encryption" in the latest version of its Firefox browser, Mozilla has had to eat crow and issue a patch for a "critical" security hole created by the same opportunistic encryption.
Employees at overseas AT&T call centers stole the names and Social Security numbers of around 280,000 U.S. customers, according to the Federal Communications Commission, which fined the wireless carrier a record $25 million for lax data security practices.
Despite raging security concerns--rightly or wrongly--with keeping sensitive data in the cloud, the 2015 Vormetric Insider Threat Report (ITR) finds 60 percent of U.S. IT decision makers store it there anyway. 46 percent say that behavior is a top risk for data breaches.
Computer systems that require a high-level of data security, such as classified networks, are often isolated from the Internet, a method known as air gapping. Researchers at Ben-Gurion University's Cyber Security Research Center have developed a method called BitWhisper for retrieving data from air-gapped computers using heat emissions and thermal sensors.