Data Security

Data Security news, information, and how-to advice

security automation robot
How You Will Get Hacked Next

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage

security thinkstock

RSA Conference preview: The agenda can't keep up

The latest, scariest, most sophisticated threats are too fresh for the RSA Conference to cover, but the real value will be great info on how to be a better defender

cyber warfare war

How AI is stopping criminal hacking in real time

At the risk of overstating the obvious, criminals are winning the cyber war right now

hacker hacked security risk

Why 2017 will be the worst year ever for security

High-profile breaches are the tip of the iceberg. Many have never been detected or disclosed -- and without major infrastructure changes, it'll only get worse

datacenter servers warehouse database

The essential guide to MongoDB security

MongoDB has everything you need to keep your data safe; here's what to look for and how to configure it

sandisk ixpand flash drive

33% off SanDisk iXpand Flash Drive 32GB for iPhone and iPad - Deal Alert

The perfect companion for your iPhone, the iXpand Flash Drive lets you free up space on your iPhone, back up your camera roll, and even watch videos straight from the drive4. The flexible Lightning connector works with most cases and...

data security encryption

Hadoop vendors make a jumble of security

That's both good and bad news, as big data security management is tough with the current lack of standardization

server cables orange

Machine behaviors that threaten enterprise security

What to do when machine learning on the inside turns against the perimeter

binoculars looking watch outlook future

Study: 62% of security pros don’t know where their sensitive data is

Forrester report finds organizations struggle with understanding and controlling sensitive data

05 tools

The essential guide to antimalware tools

Admins can choose from a bevy of secondary scanners and specialized tools to clean up infected or infested PCs

malware attack cyberespionage code hacker

Attackers start wiping data from CouchDB and Hadoop databases

After MongoDB and Elasticsearch, attackers are looking for new database storage systems to attack

beach tide summer sand

Passwords: A long goodbye

The campaign to repeal and replace passwords with more secure authentication is making progress. But even those involved say it will be a long time before they disappear

Closeup of combination safe

Mobile is still the safest place for your data

IT likes to fret about smartphones and tablets, but more established technologies—even paper documents—are where the data-breach risks lie

security code big data cyberespionage byte

After MongoDB, ransomware groups hit exposed Elasticsearch clusters

Over 600 Elasticsearch instances had their data wiped and replaced with a ransom message

code hacker cyberespionage eye data

Disk-wiping malware Shamoon targets virtual desktop infrastructure

The latest variant of the cyber sabotage program has default credentials for a Huawei desktop virtualization solution

HP HPE media gallery image 1

Dangerous assumptions that put enterprises at risk

Those who make assumptions -- trusting that solutions won't fail and users won't click -- could leave a company's assets vulnerable and lead to a breach

Digital Key encryption

Q&A: RSA crypto pioneer Adleman keeps pushing the limits

Dr. Leonard Adleman tells InfoWorld all about RSA's big breakthrough, why DNA works great for computing, and our coming cyberwar risk

security code big data cyberespionage byte

More than 10,000 exposed MongoDB databases deleted by ransomware groups

Five groups of attackers are competing to delete as many publicly accessible MongoDB databases as possible

Load More