Data Security

Data Security news, information, and how-to advice

healthcare it security jobs
millennial hipster standing in front of huge black chalkboard looking at data

binary data

Managing data in a mobile and cloud world

A simple strategy for standardizing metadata can improve decision-making, data governance and data security. (Insider; registration required)

usb thumb flash drive stick

Five signs an employee plans to leave with your company's data

By offering early warning indicators, predictive analytics plays a growing role in detection and prevention

Startup takes heat over online tool that checks Ashley Madison data

Trustify was accused of spamming email addresses that showed up in the leak

Court: FTC can take action against companies with sloppy cyber security

Hotel chain Wyndham had challenged the FTC's authority to mandate cyber security standards

chinese espionage

Chinese spies target US intellectual property

The U.S. economy is losing hundreds of billons of dollars each year to economic espionage, mainly from China, due to a ‘stupefying’ lack of security

devops

What is devops? Not even 'leaders' and 'practitioners' can agree

Delphix's first 'State of DevOps' report finds even the definition of the word is in flux among its practitioners

changed priorities

10 years on: 5 big changes to computer security

In the 10 years since Security Adviser debuted, the threats have changed -- as have the defenses, and no one can argue computer security is safer overall

equations on chalkboard 87173350

How college CIOs brace for back-to-school (with video!)

Enterprise IT stands to learn a lot from higher-ed CIOs, who are on the front lines in tackling demands for connectivity, service, security and innovation.

old pcs computers desktops trash recycle

10 security technologies destined for the dustbin

Systemic flaws and a rapidly shifting threatscape spell doom for many of today’s trusted security technologies

a thief caught stealing from the surveillance equipment 77379357

Make stolen data worthless

You can't stop intruders from penetrating your network, but with the right DLP solution, you can encrypt stolen data so it can never be used

Tech industry objects to terrorist activity reporting section in U.S. legislation

Industry groups have asked the Senate to delete the section which requires them to report vaguely defined terrorist activity

DHS warns about privacy implications of cybersecurity bill

The bill under consideration of the Senate has been criticized by privacy groups

fb servers

7 essential SQL Server security tips

How to protect your database from SQL injection, data theft, rogue users, and well-meaning meddlers without tying your environment in knots

Groups urge Obama to oppose cyber threat sharing bills

They say the Senate's CISA cyber threat information sharing bill would allow businesses to share too much information

Simple encryption and control come to Office 365

When collaboration moves to the cloud, security policy and controls must move into the documents themselves

Cyber Skull

From dating to driving, hackers hit where it hurts

Ashley Madison, Jeep, probably whatever smartwatch you're perusing -- there is no limit to where and when hackers can strike

broken heart candy

The Ashley Madison hack -- this time it's personal

In the wake of the OPM data breach, another grim reminder of the folly of hobbling encryption

watermarked map

When stolen data can ‘phone home’

Digital watermarking of sensitive data can let organizations know immediately not only if it has been stolen, but where and how it is being accessed

Load More