Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

1 threat intro
bug bounty

magnifying glass contract

Want good cyber insurance? Read the fine print

Given the explosive growth of online threats, cyber insurance is becoming mandatory for most organizations. But the field is still new enough that buying an effective policy takes a lot of due diligence and attention to the fine print....

handcuff arrest

Hire a DDoS service to take down your enemies

With the rampant availability of IoT devices, cybercriminals offer denial of service attacks to take advantage of password problems.

continuous authentication

Continuous authentication: Why it’s getting attention and what you need to know

In some cases traditional authentication processes are not enough to provide strong security throughout a user work session. That’s where continuous authentication comes in.

phone picture conference

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

diy robot

Bots: Biggest player on the cybercrime block

Bot fraud cost an estimated $31 billion in the US last year, dwarfing the estimated $1 billion lost to ransomware and DDoS attacks.

accusation

What's the value in attack attribution?

Does attack attribution and knowing your adversaries really matter when it comes to securing the enterprise?

01 respond attack

How to respond to a cyber attack

Following a breach, organizations should focus on mitigating damage and data loss and providing information to law enforcement. Partner at Ballard Spahr, LLP and former Assistant U.S. Attorney Ed McAndrew and Guidance Software...

magnifying glass stock prices

Microservices offer speed and flexibility, but at a price

The benefits of microservices include speed to market, lower costs, and greater flexibility -- but microservices also come with their own set of security and management challenges.

globe flags

Global cybercrime prosecution a patchwork of alliances

Global efforts to combat cybercrime are built on a patchwork of alliances, taskforces and personal relationships.

1 threatening

7 universal rules of threat intelligence

Levi Gundert, vice president of intelligence and strategy at Recorded Future, will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not.

eliminate insider threats 1

Who should be on an insider risk team?

Catching an insider taking confidential information doesn't happen by chance, and policies and procedures must be in place to know what to do when an insider is caught.

security code big data cyberespionage byte

Cloudflare bug exposed passwords, other sensitive data from websites

For months a bug in Cloudflare's content optimization systems exposed sensitive information sent by users to websites including passwords, session cookies, authentication tokens and even private messages.

fraud infog primary

Has fraud met its match?

New and dynamic authentication factors can help prevent identity theft. The idea of using a fingerprint reader to log on to a smartphone is nothing new, but the latest wrinkle is the pressure with which that finger pushes on the...

Digital Key encryption

Stop using SHA1: It’s now completely unsafe

Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature.

How You Will Get Hacked Next

Nowhere to hide: 9 new hacks coming to get you

The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm

wallet man money

To pay or not to pay: Too many victims say yes to ransomware

Ransomware’s success rate is so alarming that it is the subject of an all-day “summit” at this week’s RSA conference. Ironically, experts say defending against it is not terribly difficult, and how to do it is widely publicized – it’s...

glowing box

Rise of as-a-service lowers bar for cybercriminals

Widespread availability of RaaS and botnet rentals for DDoS attacks make it easy for those without technical skills to enter into cyber crime

01 challenges

What cyberinsurance gotchas companies must be ready for

CipherLoc Vice President Mike Salas details six challenges companies will face as the insurance industry begins to expand its presence in the cybersecurity industry.

Load More