Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

eliminate insider threats 1
security code big data cyberespionage byte

fraud infog primary

Has fraud met its match?

New and dynamic authentication factors can help prevent identity theft. The idea of using a fingerprint reader to log on to a smartphone is nothing new, but the latest wrinkle is the pressure with which that finger pushes on the...

Digital Key encryption

Stop using SHA1: It’s now completely unsafe

Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature.

How You Will Get Hacked Next

Nowhere to hide: 9 new hacks coming to get you

The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm

wallet man money

To pay or not to pay: Too many victims say yes to ransomware

Ransomware’s success rate is so alarming that it is the subject of an all-day “summit” at this week’s RSA conference. Ironically, experts say defending against it is not terribly difficult, and how to do it is widely publicized – it’s...

glowing box

Rise of as-a-service lowers bar for cybercriminals

Widespread availability of RaaS and botnet rentals for DDoS attacks make it easy for those without technical skills to enter into cyber crime

01 challenges

What cyberinsurance gotchas companies must be ready for

CipherLoc Vice President Mike Salas details six challenges companies will face as the insurance industry begins to expand its presence in the cybersecurity industry.

cyber warfare war

How AI is stopping criminal hacking in real time

Almost every day, there’s news about a massive data leak -- a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around,...

hacker hacked security risk

Why 2017 will be the worst year ever for security

High-profile breaches are the tip of the iceberg. Many have never been detected or disclosed -- and without major infrastructure changes, it'll only get worse

11 phish

Phishing test results in a barely-passing grade for users

Diligent recently surveyed 2,000 people to see who got caught hook, line and sinker for the phishing scam.

macbook air apple

Are Apple-specific threats on the rise?

Macs are really no more secure than a PC, but for many years there just weren’t as many out there because of the expense of the hardware and other issues. They've historically been a much less popular choice among both consumers,...

president barrack obama

Obama’s cybersecurity legacy: Good intentions, good efforts, limited results

President Obama declared early in his presidency that cybersecurity was a priority. Most experts agree he delivered a significant effort. But they also agree that the effort didn’t deliver better security.

President Donald Trump signs an executive order to impose tighter vetting

Security execs voice concern over Trump travel ban

Senior security industry professionals were concerned about the travel ban imposed this weekend by President Trump, and worried that the repercussions could go far beyond the handful of countries singled out so far.

sandisk ixpand flash drive

33% off SanDisk iXpand Flash Drive 32GB for iPhone and iPad - Deal Alert

The perfect companion for your iPhone, the iXpand Flash Drive lets you free up space on your iPhone, back up your camera roll, and even watch videos straight from the drive4. The flexible Lightning connector works with most cases and...

eliminate insider threats 1

How to eliminate insider threats

Mike McKee, CEO OF ObserveIT, lists some tips to help organizations quickly jump on any irregularities that come from within your company’s network.

digital security profiles primary

What privacy profile do you fit?

In an era of constant likes and shares, where is the privacy line drawn? Are you someone who worries about being watched as you purchasing an item online? Or do you consider loss of privacy the price you pay for having the world at...

server cables orange

Machine behaviors that threaten enterprise security

Machine learning has moved enterprise security forward, allowing for visibility inside the network in order to better understand user behavior. However, malicious actors are using what is done with machine learning on the inside in...

ransomware hardware security embedded circuit board integrated controller

Researchers propose a way to use your heartbeat as a password

Researchers at Binghamton State University have proposed a model that uses patients' heartbeats as an encryption key for electronic records.

malware attack cyberespionage code hacker

Attackers start wiping data from CouchDB and Hadoop databases

Researchers are reporting data wiping attacks hitting openly accessible Hadoop and CouchDB deployments.

Load More