Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

Hacking stealing password data
hiding in plain sight

black white hat

How computer security pros hack the hackers

If you want to meet a really smart hacker, talk to a cybersecurity defender. These talented professionals are working every day to make cybercrime harder and less lucrative.

Gmail Google Mail

Google uses machine learning for new security features in Gmail

Google has pushed four new security features to enterprise users on G Suite, the search giant's hosted business offering. The new protections come shortly after Citizen Lab report exposed a Russia-linked Phishing and disinformation...

03 bounty hunter

10 things threat hunters watch for

Pursuing cyber threats is much like conventional hunting in that it requires patience, persistence and a keen eye, and when done correctly, it can be both exhilarating and rewarding. Threat actors do everything in their power to blend...

maze lost question direction wayward

5 common ways businesses lose valuable data

David Zimmerman, CEO and Founder of LC Technology, lists five ways individual employees and IT are causing companies to lose data, and some best practices for preventing a crippling data loss.

data recovery

Few firms will be ready for new European breach disclosure rules, fines

The new European General Data Protection Regulation goes into effect next May, with onerous notification requirements and high penalties, but a year might not be enough for firms to get ready

ryan benson

A day in the life of a threat researcher

After leaving Exabeam at the end of the workday, Ryan Benson’s mind doesn’t shut off when it comes to thinking about designing new defenses against Black Hats. See what his day looks like.

shadowy attacker hooded (public domain)

How to maintain data oversight to avoid ‘shadow data’

As more companies take a liberal approach to cloud app provisioning, they need to make sure that all apps – including vetted ones – are carefully secured, optimized and monitored. Al Sargent, senior director at OneLogin, offers the...

tatu ylonen

Unmanaged, orphaned SSH keys remain a serious enterprise risk

There are many ways attackers can try to infiltrate an enterprise, but many times enterprises make it so easy that the attackers don’t have to try too hard. Consider the current state of orphan SSH (Secure Shell) keys and how...

3 keychain keys

Outsourcing security: Would you turn over the keys to a third party?

Years ago it would have been unthinkable to give up control to securing your most valuable assets. But for some companies the risk of handing the security keys to a third party is less than the idea of facing the daily barrage of...

microphone interview voice reporter

Vocal theft on the horizon

Voice imitation technology has the potential to undermine yet another form of biometric authentication. Security experts say the key is to make sure the individual voice information is stored on the user’s device, not in a centralized...

horse asleep

Risks to the enterprise from the one-trick pony

Whether an adversary is highly skilled and targeting an organization or taking advantage of a black market service to make a few bucks, any threat is a threat.

chair spotlight

How CISOs can answer difficult questions from CEOs

A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started.

1 incident response police tape crime death

Incident response is like tracking down a perpetrator

What is incident response? Larry Zulch, President & CEO, Savvius, walks us through the crime scene.

marketing man person communication

8 things CMOs need to know right now

At the recent Marketing Nation Summit, industry leaders offered CMOs tips and strategies for success — including why less is more when marketing to customers.

firewall hole

Third parties leave your network open to attacks

With the Target example as the high-water mark, enterprises need to worry about the lack of security on a third parties’ part. How do you tighten things up?

0 intro strikeout baseball

How to strike ransomware out

Carbonite created this list of 10 important ransomware prevention tips and best practices.

gift cards

Criminals turning to fraudulent gift cards

As retailers and other businesses increase security measures to prevent the use of gift cards purchased with stolen credit card numbers, cyber criminals have been focusing on fraudulent gift cards, according to a report released this...

marketing automation gears

Automated mitigation on endpoint devices and networks can be tricky

Many companies have automated systems in place for preventing, detecting, and investigating security incidents, but automating the incident response and mitigation process for networks and endpoint devices has been a tougher nut to...

Load More