Data Security

Data Security news, information, and how-to advice

securiy companies watch
the word

data security strategist

What it takes to become a data security strategist

Data security strategist is a fast-growing career, and one that will get even hotter as data from AI and IoT inititiatives pours into enterprises

2 encryption

Why we need to encrypt everything

Many major websites already encrypt by default. Here’s why encryption and multifactor authentication should be everywhere

data breach hacker

Report: 30% of malware is zero-day, missed by legacy antivirus

At least 30 percent of malware today is new, zero-day malware that is missed by traditional antivirus defenses, according to a new report

81p5l6fqewl. sl1500

38% off Seagate Backup Plus Ultra Slim 2TB Portable External Hard Drive - Deal Post

The Backup Plus Ultra Slim Portable Drive is one of Seagate's thinnest and most eye-catching portable hard drives

hidden door

How to respond to device and software backdoors inserted or left by vendors

Here are the challenges to finding them, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma

Edward Snowden Spiegel headline

Cebit showcases security after Snowden

One of the biggest changes on the internet in the four years since his revelations about NSA surveillance is the growth in the use of encryption

01 plan

Do you have an incident response plan in place?

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored.

shrugging man unknown question mystery

6 security essentials the CIA forgot

Good security isn't magic. Common-sense measures could have stopped all those secrets from being revealed and damaging the agency

Focusing on cloud computing's important role.

Google Cloud sharpens its enterprise strategy

Google used to rely mainly on its technical bona fides to sell its cloud, but now it's meeting customers halfway with new enterprise-friendly capabilities and support

diy robot

Bots: Biggest player on the cybercrime block

Bot fraud cost an estimated $31 billion in the US last year, dwarfing the estimated $1 billion lost to ransomware and DDoS attacks

01 respond attack

9 secrets to cyberattack survival

Following a breach, organizations should focus on mitigating damage and data loss and providing information to law enforcement

computer programmer or hacker

Red alert! Beware of insiders bearing APTs

Big enterprises worry about APTs -- and employees who may be using them to engage in corporate espionage. These measures can help you catch the perps

3 bitcoin

Would killing bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts say that doing away with the cybercurrency would only force cybercriminals to find another anonymous avenue to extort money

security automation robot

Build your security defense on data, not guesswork

Stop obsessing about the latest overhyped security threats. Delve into your own data about successful attacks on your organization first—and defend accordingly

How You Will Get Hacked Next

Nowhere to hide: 9 new hacks coming to get you

The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage

security thinkstock

RSA Conference preview: The agenda can't keep up

The latest, scariest, most sophisticated threats are too fresh for the RSA Conference to cover, but the real value will be great info on how to be a better defender

cyber warfare war

How AI is stopping criminal hacking in real time

At the risk of overstating the obvious, criminals are winning the cyber war right now

Load More