Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

spearfishing trap
hacker hire

usb stick

40% off Corsair Waterproof Shockproof 256GB USB 3.0 Flash Drive - Deal Alert

This USB 3.0 flash drive is designed to keep your files safe. The anodized, aircraft-grade aluminum housing is waterproof to 200 meters, vibration-resistant, and shock-resistant. USB 3.0 means read speeds up to four times faster than...

1 classroom

5 ways data classification can prevent an education data breach

Spirion CEO Jo Webber offers examples of how the education vertical can leverage data classification to reduce the risk of data theft and costly compliance violations.

seagate 4tb drive

33% off Seagate Expansion 4TB Desktop External Hard Drive USB 3.0

Instantly add space for more files, consolidate all of your files to a single location, or free up space on your computer's internal drive to help improve performance.

screen shot 2016 11 28 at 10.07.10 am

29% off Seagate Expansion 8TB Desktop External Hard Drive USB 3.0

Instantly add space for more files, consolidate all of your files to a single location, or free up space on your computer's internal drive to help improve performance.

0 intro best practices

Best practices to fight corporate security risks

Ajit Sancheti, CEO and co-founder of Preempt, examines best practices each organization and their users must deploy, both in and out of corporate networks, to minimize malicious threats in inconspicuous (and conspicuous) places.

01 holiday phishing

10 top holiday phishing scams

It always happens this time of year, an influx of holiday-related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to...

deals of week thumbnail

Best Deals of the Week, November 7th - November 11th - Deal Alert

Check out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of November 7th. All items are highly rated, and dramatically discounted.

fog visibility island

Visibility, security top concerns for cloud computing adoption

Enterprises considering adopting public clouds are concerned about where their data is located and how it's protected, according to a new survey by IDG.

1 new approach

7 steps to start a bug bounty program

Paul Ross, senior vice preside of marketing at Bugcrowd breaks down how to get started with a bug bounty program, and how to prepare your organization for this new approach to vulnerability testing.

google brain

AI makes security systems more flexible

Advances in machine learning are making security systems easier to train and more flexible in dealing with changing conditions, but not all use cases are benefitting at the same rate.

danger unaware ts

Why assuming data is secure is dangerous and stupid

The latest news concerning Hilary Clinton’s email has columnist Rob Enderle ticked off because it highlights an ongoing problem regarding security breaches, assuming we are secure.

xiongmai webcam

DDoS attack on Dyn could have been prevented

The Online Trust Alliance issued a prescription earlier this year for securing IoT devices. But even the alliance’s director admits that, with billions of devices already in use, change will not come easily or quickly.

terms and conditions

The FCC’s new privacy rules are toothless

If opt-in agreements can be hidden within T&C documents, consumers will have little choice than to sign away their privacy rights.

privacy policy unlocked padlock

The limits of encryption

The latest WikiLeaks revelations included a reminder that there are revealing things that just can’t be encrypted.

arrows asphalt direction

What awareness is supposed to be

Recent W-2 and accounts payable thefts show governance should be the cornerstone of awareness.

biokey

REVIEW: BIO-key’s plug-in fingerprint readers for Windows 10 computers

BIO-key loaned me these three models for evaluation. I tested them on two notebooks: one running Windows 10 Home, and the other Windows 10 Pro. Find out the results.

Digital Key, security, encryption

Critical flaws found in open-source encryption software VeraCrypt

A new security audit has found critical vulnerabilities in VeraCrypt, an open-source full disk encryption program that's the direct successor of the widely popular, but now defunct, TrueCrypt.

hacker

Enterprises outsmarting themselves with security, while attackers easily use common techniques

Attackers use common techniques to steal data, while companies focus too much on sophisticated attacks, according to the second annual Hacker's Playbook, based on an analysis of nearly 4 million breach methods.

Load More