Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

businesspeople passing notes in a meeting 78781404
Family in silhouette waving goodbye at airport

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

the word

Blockchain: Overhyped buzzword or real-deal enterprise solution?

While blockchain technology may be a hotspot in data privacy, experts disagree about whether it’s a good fit for enterprises that have traditionally relied on centralized data control.

1 app hacked

How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use

Man being crushed by large rock on top of laptop feeling stressed overworked

InfoSec pros feel less external pressure, take security more personally

Security professionals are feeling less pressure from management, less pressure to approve IT projects early, and are less worried about emerging technologies, according to a survey released this morning. But they are also putting...

11 insider threat

Detecting insider threats is easier than you think

Security experts weigh in on stopping the danger from your own employees. Access and security awareness training are the main themes to finding the danger that is within your own walls.

dragon statue head

Can AI and ML slay the healthcare ransomware dragon?

Healthcare is well known as “low-hanging fruit” for ransomware attacks. But according to some experts, artificial intelligence and machine learning, as part of a “layered” security program, can make them a much more difficult target.

1 intro spearfishing

What enterprises can learn in the aftermath of a phishing attack

Tychon’s Chief Technology Officer Travis Rosiek offers tips for enterprises on how to analyze former phishing attacks to improve defenses against future attacks, such as creating a database of captured phishing emails to learn...

goal keeper prevention

Prevent or detect? What to do about vulnerabilities

A good security program includes prevention, detection, and response, so security practitioners need to focus on the vulnerabilities that matter.

1 intro

5 ways data classification can prevent an insurance data breach

Spirion CEO Todd Feinman offers examples of how insurance firms can leverage data classification to reduce the risk of data theft and costly compliance violations.

bitcoins

Don't pay ransoms. But if you must, here's where to buy the Bitcoins

Ransomware grew into a $1 billion industry last year, and ransom payments now account for nearly 10 percent of the entire Bitcoin economy. Avoiding becoming part of that statistic requires good endpoint security and effective backups....

People walking with airplane in background

Email security appears grounded as attacks continue to take flight

With clever cybercriminals finding creative new ways to get to users, has email security lost the battle to protect.

iot energy

Report: Criminals find profit rates of up to 95 percent with DDoS attacks

The emergence of the DDoS-as-a-service industry has lowered the costs for attacks to $25 or less, allowing criminals with no technical expertise to reach profit margins of up to 95 percent, according to a report released last week

cloud question

After Amazon outage, HealthExpense worries about cloud lock-in

Financial services companies as popular targets of cybercriminals for the obvious reason -- they're where the money's at. And health care companies have medical records, which are very valuable on the black market since the...

cybersecurity

How to fend off cyberattacks and data breaches

Experts in online security and data protection explain how smaller businesses can prevent security breaches and digital attacks.

81p5l6fqewl. sl1500

38% off Seagate Backup Plus Ultra Slim 2TB Portable External Hard Drive - Deal Post

The Backup Plus Ultra Slim Portable Drive is one of Seagate's thinnest and most eye-catching portable hard drives

1 intro insider threat

How to stop insider threats

There are a number of things that decision makers can do to protect their companies and minimize, if not eliminate, the threat of employee theft of sensitive and confidential information.

1 threat intro

These 10 people may be your greatest inside security risks

Last year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access.

bug bounty

How much is a bug worth?

With recent increases in bug bounty amounts in the news, Bugcrowd shows how a bug bounty amount is calculated.

Load More