Data Protection

Data protection news, software and solutions, and analysis for IT professionals
  • OpenDNS introduces VPN, content filtering for mobile devices

    Posted November 13, 2012 - 10:01 am

    OpenDNS, a company that specializes in secure Domain Name System lookups, has released a suite of security services built around its core DNS product that are intended to provide safer browsing outside of a corporate network.
  • Researchers identify year-long cyberespionage operation targeting Israelis, Palestinians

    Posted November 12, 2012 - 1:59 pm

    The recent cyberattack that infected Israeli police computers with malware was likely part of a year-long cyberespionage operation with targets in Israel and the Palestinian territories, according to security researchers from antivirus vendor Norman.
  • How to secure big data in Hadoop

    Posted November 12, 2012 - 8:43 am

    The promise of big data is enormous, but it can also become an albatross around your neck if you don't make security of both your data and your infrastructure a key part of your big data project from the beginning. Here are some steps you can take to avoid big data pitfalls.
  • Symantec broadens encryption options for Apple mobile devices, Dropbox file-sharing

    Posted November 9, 2012 - 4:04 pm

    Symantec this week announced two new data encryption options, one that is file-based encryption for use with Dropbox, and the second that works as an extension to the Apple iOS mail client to encrypt and decrypt documents.
  • As Windows gets safer, old vulnerabilities still have bite

    Posted November 8, 2012 - 8:49 pm

    Microsoft Windows is safer- and harder to exploit than ever before. Despite the improvements in OS security, however, security experts tell ITworld that it's the old wounds that hurt the most, as organizations continue to fall to cyber attacks that exploit vulnerabilities discovered - and patched - years earlier. Why?
  • What you should know about Microsoft's new BitLocker Management

    Posted November 8, 2012 - 4:27 pm

    Encryption can be a bit of a double-edged sword for organizations. It is an effective and essential tool for protecting sensitive data, but it often comes with a healthy side of user confusion and help desk calls. Microsoft hopes to simplify the process of implementing and managing BitLocker data encryption with the launch of Microsoft BitLocker Administration and Management (MBAM) 2.0 Beta 2.
  • US election could mean movement on high-skill immigration, copyright

    Posted November 7, 2012 - 3:06 pm

    Tuesday's election in the U.S. leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for compromises on a handful of issues.
  • Anonymous-backed demonstration unfolds outside U.K. Parliament

    Posted November 5, 2012 - 6:03 pm

    Members and followers of the Anonymous hacking group demonstrated outside the British Parliament in London Monday, following a series of hacking attacks to protest, among other things, the incarceration or confinement of alleged hackers and various proposals for monitoring communications.
  • Security through obscurity: How to cover your tracks online

    Posted November 5, 2012 - 4:26 pm

    From Tor to steganography, these six techniques will help obscure the data and traces you leave online
  • E-voting systems only as reliable as the paper trail they produce

    Posted November 5, 2012 - 12:59 pm

    Electronic voting machines introduce many problems and, without accompanying paper records, are not as reliable as paper ballots
  • Smart meters not so clever about privacy, researchers find

    Posted November 5, 2012 - 12:46 pm

    Researchers at the University of South Carolina have discovered that some types of electricity meter are broadcasting unencrypted information that, with the right software, would enable eavesdroppers to determine whether you're at home.
  • White Paper

    Security Best Practices for File-based Data Movement - an IT Practitioner's Guide

    Posted November 5, 2012 - 12:45 pm

    Data security for file-based data movement is finally getting the attention it deserves. What was once a concern only in the financial services sector is now being treated seriously by all industries.
  • Firefox to force secure connections for selected domains

    Posted November 2, 2012 - 9:17 am

    Mozilla introduced a pre-loaded list of domains for Firefox that only can be connected to securely in order to help protect the privacy and security of users.
  • White Paper

    LWG Consulting Takes Business Continuity to the Next Level

    Posted October 31, 2012 - 11:45 am

  • Four commands to spook a sysadmin

    Posted October 30, 2012 - 11:41 am

    Wanna give a good Halloween scare to that special system or database administrator in your life? Try mentioning one of these commands
  • Irked by cyberspying, Georgia outs Russia-based hacker -- with photos

    Posted October 30, 2012 - 7:44 am

    In one of the photos, the dark-haired, bearded hacker is peering into his computer's screen, perhaps puzzled at what's happening. Minutes later, he cuts his computer's connection, realizing he has been discovered.
  • Breach prevention is dead. Long live the 'secure breach'

    Posted October 29, 2012 - 5:41 pm

    Every defense paradigm has a finite life span and the IT industry's breach prevention paradigm, which is based on perimeter technology designed to keep the bad guys out, is completely out of step with today's threat landscape. It's time to move on to a new era: the "secure breach" era.
  • Barnes & Noble halts use of PIN pad devices after data breach

    Posted October 24, 2012 - 9:43 pm

    Barnes & Noble has removed PIN pad devices from all of its nearly 700 stores nationwide as a precaution after detecting evidence of tampering with the devices at 63 of its stores in eight states.
  • White Paper

    Performance Analytics: How Normal is Your Data

    Posted October 24, 2012 - 12:30 am

    This VMware paper takes a technical look at a variety of IT performance data (operating system metrics, quality-of-service metrics, business performance metrics, etc.) to determine how well these metrics can be modeled as "normally distributed." This concept is at the heart of VMware vCenter Operations' performance analytics capability, and provides a deeper insight into how the technology helps adapt and learn typical IT behaviors to then provide automated policies that keep alerts and outages in check.
  • White Paper

    Disaster Recovery Exercises Fall Short of the Finish Line

    Posted October 23, 2012 - 7:30 pm

    Though many enterprises have advanced disaster recovery technologies put in place, they still fall short when it comes to actual preparedness due to a lack of formal processes and a strict regimen for exercising DR plans. This report details 10 tips for updating and improving your current DR exercise program to help you meet expected recovery objectives when faced with an unexpected event.
  • White Paper

    Fact Sheet: Webroot Intelligent Network

    Posted October 23, 2012 - 5:00 pm

    Webroot Intelligent Network (WIN) integrates billions of pieces of information from multiple sources to create the world's largest malware detection net. Get the facts on how WIN is different from other cloud-based anti-virus solutions.
  • 12 industry disaster scenarios

    Posted October 20, 2012 - 7:25 am

    The end of the world may or may not be nigh, but in the tech industry, many of these possibilities could easily become reality
  • Webcast

    Extend the Virtual Edge of the Data Center to the Branch

    Posted October 10, 2012 - 5:30 pm

  • White Paper

    File Sharing: Risk or Remedy?

    Posted October 9, 2012 - 4:30 pm

    Despite the need for effective document collaboration in the enterprise, many organizations are failing to provide their employees with the right tools to get the job done. Today's knowledge worker wants platform-agnostic, on-demand access to their files whenever and wherever they need them... and they'll bring this functionality into the organization whether IT approves of it or not. As a result, end-users are driving the adoption of cloud-based file sharing solutions such as Dropbox and Box, while corporate IT departments tend to dismiss these tools due to security concerns - both perceived and real.
  • Question

    How to monitor an employee desktop?

    Posted October 9, 2012 - 8:58 am

    I suspect some of my employees do not give their best performance, and access confidential company data and treat it without care. What can I do to monitor their activity on their PC or laptop without their knowledge?

Join today!

See more content
Ask a Question