Data Security

Data Security news, information, and how-to advice

insider threats
Digital Key, security, encryption

Bank Vault protecting data inside

5 steps to stronger data security

The old cliche is true: Your organization's most precious asset is its data. Five basic security building blocks can ensure its safety

virtual data wave pattern

How data virtualization delivers on the devops promise

Your data could be standing in the way of getting the most out of devops and continuous delivery. It's also a significant security risk in development -- and that's about to get more expensive

1 linkedin

A hacker is selling 167 million LinkedIn user records

The data includes hashed passwords for 167 million accounts and likely dates back to 2012

Digital Key, security, encryption

Security researchers crack new version of CryptXXX ransomware

An updated decryptor tool can help users recover files affected by the CryptXXX ransomware program

<HOLD UNTIL JUNE FOR CW COVER> digital europe circuit board barbed wire barrier obstacle thinkstock

EU's data privacy regulations put the pressure on IT

European Union authorities are requiring companies that handle EU citizens' data to comply with some of the strictest data privacy regulations in the world -- or pay a steep price

marklogic 9 nosql database

Is your data safe when it's at rest? MarkLogic 9 aims to make sure it is

A new update to the NoSQL database adds Cryptsoft technology

Scissors cutting money for budget slashing

Where to cut corners when the security budget gets tight

Security pros provide advice on where to focus your efforts when money is unexpectedly short on supply

Panama papers

Panama Papers leak explained: What you need to know about the Mossack Fonseca hack

Offshore tax shelters may pay, but scrimping on security doesn't

planning

How to perform a risk assessment

A risk assessment gives you the information protection equivalent of the opposing team’s playbook, telling where and how attackers are most likely to strike and what the damage will be.

office printer

Think that printer in the corner isn’t a threat? Think again

Sitting in the corner, sometimes collecting dust, is an overlooked attack surface

breach title

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report had bad news on multiple fronts

Man trying to sleep in the middle of the night

4 tech nightmares keeping IT leaders up at night

From data breaches to social engineering, there’s plenty to keep tech types tossing and turning

cyberwar tanks fight battle combat troops army

Key battle looms in the war to protect privacy

User privacy is under attack from hackers, data miners, and the government, but the EFF and tech groups are fighting back

fight boxing vs

Fight, Microsoft, fight: Save our civil liberties

It's an all-out war with the feds over safeguarding our personal freedoms, a cause that Microsoft has actively joined Apple on

steal thief theft burglar laptop secret crime

Inside job: What CIOs miss in preventing data leaks

DLP and user training are good defenses against accidental data loss, but companies need a third approach to detect insider threats

head sand oblivious denial

Denial Syndrome: Users don’t think they'll get hacked

People who spend a good portion of their personal and professional lives online say they care about security and privacy. But most of them don’t act like it

Digital Key, security, encryption

HTTP compression continues to put encrypted communications at risk

Researchers improve the BREACH attack to extract sensitive data from encrypted HTTPS connections faster

Matthew Karlyn

Why IT can’t handle data breaches alone

The entire C-suite and board is on the hot seat for security these days -- and that makes data breaches everyone's business

Load More