Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

Digital Key, security, encryption

red blue tools

Best tools for red and blue teams are methodology, experience

Since the tools vary based on environment, it's the skills and know-how that red/blue teams need most

worry concern nervous fret

8 challenges that keep financial services CTOs and CIOs up at night

Experts in financial services, IT, security and compliance discuss the major issues facing IT executives at financial services companies.

00 intro

Not so startling revelations of how a hacker broke in

These 10 ways are becoming all too common approaches, but yet users still fall for them.

Digital Key, security, encryption

Cerber ransomware kills database connections to access important data

In order to encrypt some of the most important data stored on computers and servers, the Cerber ransomware now tries to kill processes associated with database servers.

voter registration application

Hacking an election is about influence and disruption, not voting machines

Every time there's an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage. But can...

hacking elections

Q&A: The myths and realities of hacking an election

Election hacking has become a key topic during this year's presidential elections, more so now that candidates and voters are being actively targeted by actors that are assumed to be acting with Russian support. In this modified...

slack icon

Security for your collaborative software

There’s a gaping hole in your security infrastructure right now. The front door is open, the side window is ajar, and there’s an open safe with a neon sign saying “steal my data” in flashing lights.

smartphone shocked group

Five tips for protecting your brand on social media

This summer, online payment service giant Paypal learned that bad guys had set up a fake Paypal Support page on Twitter, and then monitored the real Paypal Support page for remarks from customers. The bad guys responded to those...

Firefox, Mozilla

Firefox blocks websites with vulnerable encryption keys

The popular Firefox browser will block access to HTTPS servers that use weak Diffie-Hellman keys.

01 intro myth

Security myths that can make you laugh… or cry

To help organizations cut through the noise to focus on improving security structures, security experts identify industry myths and provide suggestions to avoid falling for them. 

red apple

How to mitigate hackers who farm their victims

Feeling raked over? You’re not alone; someone is probably probing your low hanging fruit right now. CSO covers how hackers farm the enterprise and how companies can mitigate the risks.

usb stick

42% off Corsair Waterproof Shockproof 256GB USB 3.0 Flash Drive - Deal Alert

This USB 3.0 flash drive is designed to keep your files safe. The anodized, aircraft-grade aluminum housing is waterproof to 200 meters, vibration-resistant, and shock-resistant. USB 3.0 means read speeds up to four times faster than...

yahoo headquarters

Va. senator wants SEC probe of massive Yahoo breach

U.S. Sen. Mark Warner, D-Va., on Monday urged the U.S. Securities and Exchange Commission to investigate whether Yahoo met its legal obligations to keep the public and investors informed about a massive breach of 500 million Yahoo...

hilary clinton stage

Hillary Clinton’s email has vanished but why can’t yours?

Experts agree that recent high-profile cases demonstrate that emails can be permanently destroyed. But they also warn against complacency. They still recommend treating emails as if they really are “forever.”

0 intro

6 expert tips to better secure third-party network access

Survey shows that enterprises are not worrying enough about outside access to their networks.


How flexible should your infosec model be?

Organizations need to stay on top of a fast-shifting threat landscape by updating their security policies -- without badgering users into a state of noncompliance.

muddy waters

Navigating the muddy waters of enterprise infosec

Information security finally has executives’ attention, but aligning with business needs is still challenging.

grade blackboard cminus

Is security making the grade? What IT and business pros really think

When it comes to security, who’s in charge, where do roles and responsibilities overlap, and what are the biggest challenges to aligning infosec and business goals? A joint CSO, CIO, Computerworld survey sheds some light.

Load More