Data Protection

Data protection news, software and solutions, and analysis for IT professionals
  • 10 disaster preparedness questions to ask your cloud services provider

    Posted July 19, 2012 - 3:05 pm

    A typical cloud contract contains uptime clauses and credits for missed service levels, but it often fails to adequately protect the enterprise customer. Here are 10 questions the intelligent cloud customer can ask to make sure they are sheltered from potential disaster.
  • Data Protection Officer role will be key if you operate in the E.U.

    Posted June 4, 2012 - 3:05 pm

    The European Union is considering sweeping new data protection laws that would mandate many organizations in Europe formally appoint a Data Protection Officer (DPO). To get ahead of the potential high demand for qualified candidates, organizations should consider defining their needs now.
  • What would a post-e-mail world look like?

    Posted May 29, 2012 - 11:39 am

    E-mail may be on the decline, but its archival abilities can't be matched by any current contender.
  • Is your cloud provider exposing remnants of your data?

    Posted May 10, 2012 - 11:36 am

    Security researchers report that incorrectly configured hypervisors can lead to a separation of data issue in multi-tenant environments that can expose data remnants. However, you can prevent hosting your data on 'dirty disks.'
  • Hostage crisis in the cloud: Can you rescue your data back?

    Posted May 7, 2012 - 11:51 am

    Outsourcing contracts typically include termination and transition assistance provisions that outline the IT service provider's responsibilities regarding returning data. IT buyers are surprised to find out that their cloud computing contracts contain no such provisions.
  • World's most dangerous hackers want to steal how you make money

    Posted April 26, 2012 - 7:47 am

    Black hat hackers that penetrate your organization and steal sensitive information like customers' credit card data are a serious threat. But nation-state-sponsored hackers after the intellectual property that makes your business competitive could be an even larger threat.
  • IT service providers and customers battle over data breaches

    Posted March 11, 2012 - 8:26 am

    IT outsourcing providers and their customers are fighting hard over data security liability limits at the negotiating table, and the issue is going to get more contentious in the cloud.
  • The in-depth guide to data destruction

    Posted February 6, 2012 - 3:21 pm

    A key part of any information security strategy is disposing of data once it's no longer needed. Failure to do so can lead to serious breaches of data-protection and privacy policies, compliance problems and added costs.
  • Lack of data scientists is the new Von Neumann bottleneck

    Posted January 27, 2012 - 9:00 am

    Strata Conference's Founding Chair, Edd Dumbill, talks about bridging the data and information gap.
  • Are you at risk? What cybercriminals do with your personal data

    Posted January 26, 2012 - 2:49 pm

    When hackers attack a company's systems and steal your personal data, what risk does that pose to you and other victims? How much is your name and email address worth to cybercriminals anyway? Here's what's really at stake.
  • How to guard your data as it travels among cloud providers

    Posted January 5, 2012 - 12:00 pm

    Some cloud computing vendors outsource parts of their services to subcontractors, who may in turn outsource to others. Here's how to know who has your company's data and how secure it really is.
  • Why you should stage a data-loss fire drill

    Posted August 29, 2011 - 12:13 pm

    Today's businesses breathe data like air. Have you really thought about what would happen if the lights went out and your data went away?
  • When a cloud service vanishes: How to protect your data

    Posted August 10, 2011 - 10:18 am

    More and more, we rely on Web services as a matter of course. The key word is rely: We assume that the data we upload to, say, a photo-hosting account or blog service today will still be there tomorrow. In large part, that's because we assume the services themselves will still be there tomorrow.
  • Universities that get security right

    Posted May 10, 2011 - 4:15 pm

    Professor Corey Schou was working in his school's library when he realized his computer was picking up a particularly strong Wi-Fi signal.
  • 10 utilities to secure your data

    Posted March 7, 2011 - 10:21 pm

    Very few people (certainly not the smart, savvy, people who read PCWorld articles) run their computers without up-to-date firewall and antivirus software. Most users know better than to click a message from "Bank of Amerika" that tells them "Your account is much suspect of risk, please input number for verify." Regardless, there's always a new security hole, exploit, or social-engineering trick that can catch even the intelligent and cautious in a moment of weakness. Another threat is the possibility that someone might gain physical access to your computer--whether it's a laptop thief, a sneaky coworker with dubious intent, or an aggressive lawyer for the RIAA. This feature discusses several ways to keep your digital valuables safe, even if someone is prowling around your house.
  • Four ways to mitigate mobile and cloud data leaks

    Posted February 25, 2011 - 11:41 am

    Your CEO may be paranoid about WikiLeaks, but his mobile device and cloud computing are the real threats to corporate security.
  • Painless password management: The best free and paid tools

    Posted February 1, 2011 - 9:34 pm

    Password managers and other options to keep your passwords safe on the wild and woolly Web.
  • 5 open source security projects to watch

    Posted January 20, 2011 - 9:31 am

    In this edition of 5 open source things to watch, we take a look at security products that will guard against threats without robbing your kitty.
  • New Year's Tech Resolutions for Small Businesses

    Posted December 29, 2010 - 10:06 am

    There's no telling what the future will bring, but one thing is sure: In the world of technology, nothing stays the same for very long. The year 2010 wasn't terribly turbulent for tech, but 2011 is shaping up to be more of a thrill than you might expect. From Android's scorched-earth march across the industry to malware threats that we have yet to wrap our arms around, it seems as if everything is about to change.
  • The security data and survey directory

    Posted November 30, 2010 - 3:04 pm

    Security data. Everybody needs it. Lots of companies and organizations are producing it. Here's where to find it.
  • Is there free stuff for online security? Yes!

    Posted November 16, 2010 - 5:20 pm

    Anti-virus software, online scanners, vulnerability assessment tools, packet analyzers can all be had for free.
  • Enterprise rights management and keeping data in-house

    Posted April 26, 2010 - 4:50 pm

    Several years ago, Flextronics was struggling with a thorny security issue: figuring out how to prevent sensitive and proprietary information from going astray once it was in the hands of authorized users.
  • Merchants Struggle to Comply With PCI Security In Economy

    Posted June 26, 2009 - 12:50 pm

    The heads of seven business organizations sent PCI Security Standards Council General Manager Bob Russo a cry for help earlier this month, saying the recession is making it "increasingly difficult" for merchants to meet the requirements of the Payment Card Industry's Data Security Standard (PCI DSS).
  • Experts Only: Time to Ditch the Antivirus?

    Posted June 26, 2009 - 12:32 pm

    For some who moved beyond IT Security 101 eons ago, antivirus is more than simply obsolete. It's an obstacle to a more perfect defense. And so they've chosen to disable it.
  • Seven Deadly Sins of Home Office Security

    Posted June 26, 2009 - 12:00 pm

    Good security is a key to good productivity. CSO spoke with two home office security experts about security mistakes home office workers often make (and how to avoid those errors).

Data ProtectionWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question