Black Hat USA 2019

Black Hat USA 2019, Marie-Sarah Lacharite’s ‘Breaking Encrypted Databases: Generic Attacks On Range Queries’

Thanks to Black Hat for publishing the Black Hat 2019 tremendous conference videos on their YouTube Channel Permalink ...
The Importance of Cyber-security in the world of Telecommunications

The Importance of Cyber-security in the world of Telecommunications

When it comes to cybersecurity the telecommunications sector is widely viewed as one of the most vulnerable to cyber security attacks. According to a recent report from Efficient 43% of telecommunication organisations ...
Data Erasure & The Right to be Forgotten

Data Erasure & The Right to be Forgotten

The ‘right to be forgotten’ is a legal concept that is fast evolving in the European Union (EU) that could eventually find its way to the US federal law according to data ...
The introduction of GDPR, one year on…

The introduction of GDPR, one year on…

Recently the E.U celebrated the first-year anniversary of the introduction of the General Data Protection Regulation. It is widely regarded as the most important change in data privacy regulations within the last ...
12 Global Data Protection Trends Keeping CEOs More Secure

12 Global Data Protection Trends Keeping CEOs More Secure

As cyber-security breaches increase in frequency and severity year on year, CEO’s could soon serve prison terms if an employee from his or her organization unknowingly clicks on a malicious link. The ...
Latest Data Loss Outrage

Latest Data Loss Outrage

Chris Morris - writing at Fortune, harsh's my mid-week mellow with a report on the latest data loss outrage. Bad news for oldster's, given that (reportedly) the database contains data on 40+ ...

Casino Goes All In and Wins Big with Imperva Security

There’s no good time to be hit by ransom-seeking DDoS attackers. For one casino-entertainment provider, the timing was particularly bad — right before one of its largest online poker events in 2016 ...
Building a Secure Cloud Data Lake with AWS, Protegrity and Talend

Building a Secure Cloud Data Lake with AWS, Protegrity and Talend

The Rise of the Cloud Data Lake By now, you already know that cloud computing is rapidly changing the landscape of IT and brings many business benefits. The question is how do ...
A Quick-Start Introduction to Database Security: An Operational Approach

A Quick-Start Introduction to Database Security: An Operational Approach

The recent SingHealth data breach incident exposed 1.5 million patients’ records. In the aftermath, the Cyber Security Agency of Singapore published a set of security measures aimed at improving the protection of ...
EnclaveDB, The Proposition

EnclaveDB, The Proposition

via Christian Priebe of Imperial College London, Manuel Costa and Kapil Vaswani both from Microsoft Research, comes a tour dé force of database security, ostensibly monikered EnclaveDB (published this past May 2018, ...
Loading...