Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

ransomware hardware security embedded circuit board integrated controller
malware attack cyberespionage code hacker

beach tide summer sand

Passwords: A long goodbye

There is no debate about the reality that passwords are a “fundamentally broken” method of authentication. But it is still expected to take time – likely years – for the replacement model to become mainstream.

01 holes

Tips on where to start in managing risk

What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good...

01 detection

When real-time threat detection is essential

There are times when an organization will be especially vulnerable if they don’t have real-time detection capabilities, and in preparation for these events it’s a good idea to reevaluate tools and strategies. Mike Paquette, director...

security code big data cyberespionage byte

After MongoDB, ransomware groups hit exposed Elasticsearch clusters

After deleting data from thousands of publicly accessible MongoDB databases, ransomware groups have started doing the same with Elasticsearch clusters that are accessible from the Internet and are not properly secured.

code hacker cyberespionage eye data

Disk-wiping malware Shamoon targets virtual desktop infrastructure

A cyber sabotage program that wiped data from 30,000 computers at Saudi Arabia's national oil company in 2012 has now returned and is able to target server-hosted virtual desktops.

1 bullet

5 reasons why Web gateways aren’t bulletproof

Like the threat landscape itself, web gateways have changed over the years. Today, web gateways do much more than enforce regulatory compliance and HR policies – organizations rely on web gateways to thwart internet-borne threats....

servers network

Dangerous assumptions that put enterprises at risk

Trusting that the solutions won't fail and users won't click could lead to a breach

swift banking euros

SWIFT speaks on fraudulent messages and the security moves the cooperative is making to assist its customers

SWIFT is using a multipronged approach to address interbank messaging fraud.

bug bounty

Why companies offer a hacking bounty -- and why there are challenges

Want to make a cool $20,000? All you have to do is hack the Nintendo 3DS, a handheld console that’s been out for a few years already. A listing on HackerOne spells everything out. There’s a range for this, of course -- some...

ransomware data laptop

Exposed MongoDB installs being erased, held for ransom

Security researcher Victor Gevers, co-founder of the GDI Foundation, a non-profit dedicated to making the internet safer, is urging administrators to check their MongoDB installations, after finding nearly two hundred of them wiped...

nup 173075 0006

Donald Trump offers cybersecurity warning: 'No computer is safe'

Donald Trump showed off his IT security credentials at a New Year's Eve party, suggesting that the best way to keep secrets from hackers is a huge air gap.

data center down

Tech outages of 2016 and how to prevent them in 2017

To avoid unexpected downtime, BigPanda recommends that companies take the following steps to ensure the availability and reliability of their services, but first lets review the outages of the past 12 months.

01 upright

How to make sure your data doesn’t crash and burn

10 tips to protecting your data while in-flight.

seagate 4tb drive

27% off Seagate Expansion 4TB Desktop External Hard Drive USB 3.0

Instantly add space for more files, consolidate all of your files to a single location, or free up space on your computer's internal drive to help improve performance.

ransomware at your service 4

Ransomworm: the next level of cybersecurity nastiness

As if holding your data hostage and seeking cash payment weren’t harsh enough, security experts foresee the next stage of ransomware to be even worse.

quantum computing

Experts split on how soon quantum computing is coming, but say we should start preparing now

Whether quantum computing is 10 years away -- or is already here -- it promises to make current encryption methods obsolete, so enterprises need to start laying the groundwork for new encryption methods.

report card c minus

Cybersecurity confidence gets a C- . How to improve your grade in 2017

Many security professionals feel less than certain about their own cyber defenses. Research firm CyberEdge Group and Tenable Network Security asked 700 security practitioners in nine countries and across seven industry verticals about...

online ads ad blocker

Russian 'Methbot' scammers steal $3 to $5 mil a day by exploiting ad networks

A group of Russian cybercriminals is stealing between $3 and $5 million a day by diverting legitimate advertising revenues from over 6,000 brand-name websites such as ESPN, Vogue, Fortune, Fox News and CBS Sports

Load More