data
FBI Warrantless Searches, Passwordless Sign-Ins, Keylogging Web Forms
The FBI searched emails, texts and other electronic communications of 3.4 million U.S. residents without a warrant, Apple, Google, and Microsoft have announced they will support a new passwordless sign-in standard created ...
In the Event of a Cyberattack, Secure Your Data First
The cybersecurity fallout from the Russian invasion of Ukraine will be felt for months and years to come. It will become a long-lasting problem for organizations of all sizes and government agencies, ...
Security Leaders Voice Concerns Over Dark Data
Dark data, the data that organizations are unaware of but which can still be highly sensitive or critical, is a major worry, with 84% of organizations “extremely concerned” about it, according to ...
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of March 21, 2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us ...
3 Key Elements of a Data Protection Impact Assessment
Data generated by consumers is used by interested parties to better understand customer behaviors—their likes, dislikes, interests, demographics, location and activities—for the purpose of developing or targeting products, improving engagement and personalizing ...
How Much is Your Data Worth?
Most organizations that prioritize and categorize data rarely assign it a specific monetary value. Usually, there is no need to go into that level of detail; it is enough to identify the ...
Put Vendor-Neutral Unstructured Data Management on Your To-Do List
It’s that time of year again… If you listen closely, you will hear IT organizations grinding their proverbial gears as they hash out an optimal data management strategy to deal with the ...
Your Cell Phone and Your Identity: Keeping Your PII Safe
Have you considered how often your phone number has been shared? Most of us give out our cell phone numbers all the time – to friends, acquaintances, colleagues, and even big, monolithic, impersonal ...
How Much Data Is in the World (And How Do You Secure It)?
We always talk about the importance of protecting data — but just how much data is there in the world? And what can you do to keep your sensitive data... The post ...
Protecting Data in the Cloud: A Work in Progress
Throughout its history, the tech industry has had to deal with constant change, increasingly complex architectures and security challenges. Security is a particularly deep well of concepts to navigate. One offshoot of ...