Automated Sensitive Data Leak Detection

Automated Sensitive Data Leak Detection

The average multinational spends several million dollars a year on compliance, while in highly regulated industries — like financial services and defense — the costs can be in the tens or even hundreds of millions. Despite ...
42% of used drives sold on eBay hold sensitive data, researchers find

42% of used drives sold on eBay hold sensitive data, researchers find

Selling your old hard drive on eBay may sound like a good way to squeeze a few extra bucks from unused hardware, but not if you don’t erase the data properly. A ...
Vulnerability Dashboard : Measure your progress to deliver secure apps

Vulnerability Dashboard : Measure your progress to deliver secure apps

Vulnerability Dashboard: Measure security quality of your releases over timeShiftleft is introducing a new Vulnerability Dashboard — A singular view of application security quality metrics including a list of vulnerabilities based on static/runtime analysis ...

GDPR will punish lax mobile security. Are you prepared?

The EU’s General Data Protection Regulation (GDPR) went into effect on May 25, 2018, and companies the world over are now racing to address the new rules and achieve compliance. And they’d ...

Mobile security: Enterprise data via mobile is the next frontier for cyber criminals

2018 will be the year cyber criminals focus on enterprise mobile security weak spots, exploiting them to harvest sensitive information. All organizations face new security challenges as their workers increasingly go mobile ...
Corporate Executives, Customers at Odds on Cybersecurity

Corporate Executives, Customers at Odds on Cybersecurity

Because companies accept and store sensitive, personally identifiable consumer customer data, they are responsible for safeguarding it against theft by cybercriminals. This should be common sense. Yet, according to a Ponemon Institute ...