Data Security

Data Security | News, how-tos, features, reviews, and videos

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point
big data code binary tunnel

SHEp17
video

Spectre and Meltdown | Salted Hash Ep 17

What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.

cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

cybersecurity budgets

KPIs for managing and optimizing devsecops success

CISOs need to make devsecops a priority. These KPIs can help align both security and nonsecurity stakeholders as to where, why, and how security fits into the process

man business suit newspaper [by Olu Eletu - CC0 via Unsplash]

This tech would let Facebook and Google stop fake news now

The financial services industry already has antifraud tools that, coupled with established spam detection tools, could put an end to Russian efforts to influence our elections

bos17 networking security lg

Bossie Awards 2017: The best networking and security software

InfoWorld picks the top open source software for protecting networks and their users

fivetotry nov20 gameofthrones

Winter is coming. Protect your content kingdom

The struggles that HBO is facing are prime examples of a breach of confidentiality by a trusted user or group who bypassed multiple security controls to leak sensitive intellectual property

Load More