Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

How You Will Get Hacked Next
wallet man money

glowing box

Rise of as-a-service lowers bar for cybercriminals

Widespread availability of RaaS and botnet rentals for DDoS attacks make it easy for those without technical skills to enter into cyber crime

01 challenges

What cyberinsurance gotchas companies must be ready for

CipherLoc Vice President Mike Salas details six challenges companies will face as the insurance industry begins to expand its presence in the cybersecurity industry.

cyber warfare war

How AI is stopping criminal hacking in real time

Almost every day, there’s news about a massive data leak -- a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around,...

hacker hacked security risk

Why 2017 will be the worst year ever for security

High-profile breaches are the tip of the iceberg. Many have never been detected or disclosed -- and without major infrastructure changes, it'll only get worse

11 phish

Phishing test results in a barely-passing grade for users

Diligent recently surveyed 2,000 people to see who got caught hook, line and sinker for the phishing scam.

macbook air apple

Are Apple-specific threats on the rise?

Macs are really no more secure than a PC, but for many years there just weren’t as many out there because of the expense of the hardware and other issues. They've historically been a much less popular choice among both consumers,...

president barrack obama

Obama’s cybersecurity legacy: Good intentions, good efforts, limited results

President Obama declared early in his presidency that cybersecurity was a priority. Most experts agree he delivered a significant effort. But they also agree that the effort didn’t deliver better security.

President Donald Trump signs an executive order to impose tighter vetting

Security execs voice concern over Trump travel ban

Senior security industry professionals were concerned about the travel ban imposed this weekend by President Trump, and worried that the repercussions could go far beyond the handful of countries singled out so far.

sandisk ixpand flash drive

33% off SanDisk iXpand Flash Drive 32GB for iPhone and iPad - Deal Alert

The perfect companion for your iPhone, the iXpand Flash Drive lets you free up space on your iPhone, back up your camera roll, and even watch videos straight from the drive4. The flexible Lightning connector works with most cases and...

eliminate insider threats 1

How to eliminate insider threats

Mike McKee, CEO OF ObserveIT, lists some tips to help organizations quickly jump on any irregularities that come from within your company’s network.

digital security profiles primary

What privacy profile do you fit?

In an era of constant likes and shares, where is the privacy line drawn? Are you someone who worries about being watched as you purchasing an item online? Or do you consider loss of privacy the price you pay for having the world at...

server cables orange

Machine behaviors that threaten enterprise security

Machine learning has moved enterprise security forward, allowing for visibility inside the network in order to better understand user behavior. However, malicious actors are using what is done with machine learning on the inside in...

ransomware hardware security embedded circuit board integrated controller

Researchers propose a way to use your heartbeat as a password

Researchers at Binghamton State University have proposed a model that uses patients' heartbeats as an encryption key for electronic records.

malware attack cyberespionage code hacker

Attackers start wiping data from CouchDB and Hadoop databases

Researchers are reporting data wiping attacks hitting openly accessible Hadoop and CouchDB deployments.

beach tide summer sand

Passwords: A long goodbye

There is no debate about the reality that passwords are a “fundamentally broken” method of authentication. But it is still expected to take time – likely years – for the replacement model to become mainstream.

01 holes

Tips on where to start in managing risk

What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good...

01 detection

When real-time threat detection is essential

There are times when an organization will be especially vulnerable if they don’t have real-time detection capabilities, and in preparation for these events it’s a good idea to reevaluate tools and strategies. Mike Paquette, director...

security code big data cyberespionage byte

After MongoDB, ransomware groups hit exposed Elasticsearch clusters

After deleting data from thousands of publicly accessible MongoDB databases, ransomware groups have started doing the same with Elasticsearch clusters that are accessible from the Internet and are not properly secured.

Load More