Data Security

Data Security news, information, and how-to advice

tools preventing data leaks 1
81p5l6fqewl. sl1500

checkmate chess

Real-life examples test whether you are prepared for a cyberattack

These tabletop exercises will update your response plan for live action

cloud security

Don't bring your bad security habits to the cloud

Not enough enterprises are using their cloud migrations to finally bring their data security up to snuff

spotlight

A deeper look at business impact of a cyberattack

Hidden costs can amount to 90% of the total business impact on an organization, and will most likely be experienced two years or more after the event

supply chain

U.S. intelligence to share supply chain threat reports with industry

Focus is expected to be on bad actors to pre-empt attacks, not just signatures in existing attacks

messy cio desk worker office frustration

Big data security is a big mess

No one questions that the Hadoop/Spark ecosystem can yield business-changing insights. Yet few seem willing to face up to the sorry state of big data security

nup 171016 0051

FBI said to investigate possible hack of another Democratic Party organization

The intrusion is likely to raise fresh concerns about Russia trying to meddle in the U.S. elections

block chain

Blockchain: You’ve got questions; we’ve got answers

Everything you need to know about an overhyped, but promising technology

nup 172256 0396

FBI probes DNC hack as suspicions of Russian involvement widen

Russia's involvement in trying to influence a US presidential election would be a 'watershed moment' in cyberespionage, a security expert said

healthcare data breach ts

New HIPAA guidance addresses ransomware

New guidance stresses need for regular backups and confirms that a ransomware attack is a breach that must be disclosed

Digital Key, security, encryption

New Locky ransomware version can operate in offline mode

The creators of the widespread Locky ransomware have added a fallback mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers.

republican national convention

Big data and elections: The candidates know you better than you know them

Most political campaigns emphasize providing information about a candidate to voters. But in the era of big data, they are also collecting information about voters – with little or no control, consent, or security

video

Security Sessions: Protecting data at the endpoint

In this episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Brett Hansen, executive director of Data Security Solutions at Dell, about keeping data safe in an increasingly mobile world.

pasword grave

Killing the password: FIDO says long journey will be worth it

Eliminating passwords will take years, acknowledges the FIDO Alliance. But it says it is well on its way to a faster, easier and much more secure online authentication standard

150914 salesforce dreamforce 2

Salesforce expands encryption options with 'bring your own key'

Adding BYOK encryption to its Salesforce Shield cloud services could help to alleviate data-sovereignty concerns, one analyst says

security hole in fence clouds gap opening

Study: More than 50% of small businesses were breached in the past year

In a new study, the Ponemon Institute found a dire state of security in small businesses

danger warning alarn threat

Symantec bugfest highlights the dangers of security software

Vulnerabilities exist in all software applications, but in some cases, security software has worse flaws than the average application

107473 d0851

FBI faults Clinton's personal email system, but doesn't recommend prosecution

Basic data security methods weren't followed, and it's impossible to rule out hacking, the FBI says

12 backup

11 ways to fight off ransomware

These tips will help keep your PC safe from malware

Load More