Data Protection

RSS
Data protection news, software and solutions, and analysis for IT professionals
  • Skytap's strategy: Get into the enterprise through test and dev

    Posted November 15, 2012 - 5:55 pm

    Skytap announced new features this week aimed at its test and dev customers. The company's strategy is to get a firm foothold in test and dev with the hopes that customers will choose it for full production when they're ready to move to the cloud.
  • NASA breach update: Stolen laptop had data on 10,000 users

    Posted November 15, 2012 - 5:07 pm

    Personally identifiable information of "at least" 10,000 NASA employees and contractors remains at risk of compromise following last month's theft of an agency laptop, a spokesman said Thursday.
  • NASA scrambles to encrypt laptops after major breach

    Posted November 15, 2012 - 4:29 pm

    NASA is scrambling to implement full disk encryption on agency laptops after one containing unencrypted personal information on a "large" number of people was recently stolen.
  • Adobe confirms breach of Connectusers.com forum database, shuts down website

    Posted November 14, 2012 - 5:32 pm

    Adobe has shut down Connectusers.com, a community forum site for users of its Adobe Connect Web conferencing platform, because the site's user database was compromised.
  • Adobe investigates alleged customer data breach

    Posted November 13, 2012 - 11:36 pm

    Adobe said Wednesday it is investigating the release of 230 names, email addresses and encrypted passwords claimed to have been stolen from a company database.
  • OpenDNS introduces VPN, content filtering for mobile devices

    Posted November 13, 2012 - 10:01 am

    OpenDNS, a company that specializes in secure Domain Name System lookups, has released a suite of security services built around its core DNS product that are intended to provide safer browsing outside of a corporate network.
  • Researchers identify year-long cyberespionage operation targeting Israelis, Palestinians

    Posted November 12, 2012 - 1:59 pm

    The recent cyberattack that infected Israeli police computers with malware was likely part of a year-long cyberespionage operation with targets in Israel and the Palestinian territories, according to security researchers from antivirus vendor Norman.
  • How to secure big data in Hadoop

    Posted November 12, 2012 - 8:43 am

    The promise of big data is enormous, but it can also become an albatross around your neck if you don't make security of both your data and your infrastructure a key part of your big data project from the beginning. Here are some steps you can take to avoid big data pitfalls.
  • Symantec broadens encryption options for Apple mobile devices, Dropbox file-sharing

    Posted November 9, 2012 - 4:04 pm

    Symantec this week announced two new data encryption options, one that is file-based encryption for use with Dropbox, and the second that works as an extension to the Apple iOS mail client to encrypt and decrypt documents.
  • As Windows gets safer, old vulnerabilities still have bite

    Posted November 8, 2012 - 8:49 pm

    Microsoft Windows is safer- and harder to exploit than ever before. Despite the improvements in OS security, however, security experts tell ITworld that it's the old wounds that hurt the most, as organizations continue to fall to cyber attacks that exploit vulnerabilities discovered - and patched - years earlier. Why?
  • What you should know about Microsoft's new BitLocker Management

    Posted November 8, 2012 - 4:27 pm

    Encryption can be a bit of a double-edged sword for organizations. It is an effective and essential tool for protecting sensitive data, but it often comes with a healthy side of user confusion and help desk calls. Microsoft hopes to simplify the process of implementing and managing BitLocker data encryption with the launch of Microsoft BitLocker Administration and Management (MBAM) 2.0 Beta 2.
  • US election could mean movement on high-skill immigration, copyright

    Posted November 7, 2012 - 3:06 pm

    Tuesday's election in the U.S. leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for compromises on a handful of issues.
  • Anonymous-backed demonstration unfolds outside U.K. Parliament

    Posted November 5, 2012 - 6:03 pm

    Members and followers of the Anonymous hacking group demonstrated outside the British Parliament in London Monday, following a series of hacking attacks to protest, among other things, the incarceration or confinement of alleged hackers and various proposals for monitoring communications.
  • Security through obscurity: How to cover your tracks online

    Posted November 5, 2012 - 4:26 pm

    From Tor to steganography, these six techniques will help obscure the data and traces you leave online
  • E-voting systems only as reliable as the paper trail they produce

    Posted November 5, 2012 - 12:59 pm

    Electronic voting machines introduce many problems and, without accompanying paper records, are not as reliable as paper ballots
  • Smart meters not so clever about privacy, researchers find

    Posted November 5, 2012 - 12:46 pm

    Researchers at the University of South Carolina have discovered that some types of electricity meter are broadcasting unencrypted information that, with the right software, would enable eavesdroppers to determine whether you're at home.
  • White Paper

    Security Best Practices for File-based Data Movement - an IT Practitioner's Guide

    Posted November 5, 2012 - 12:45 pm

    Data security for file-based data movement is finally getting the attention it deserves. What was once a concern only in the financial services sector is now being treated seriously by all industries.
  • Firefox to force secure connections for selected domains

    Posted November 2, 2012 - 9:17 am

    Mozilla introduced a pre-loaded list of domains for Firefox that only can be connected to securely in order to help protect the privacy and security of users.
  • White Paper

    LWG Consulting Takes Business Continuity to the Next Level

    Posted October 31, 2012 - 11:45 am

  • Four commands to spook a sysadmin

    Posted October 30, 2012 - 11:41 am

    Wanna give a good Halloween scare to that special system or database administrator in your life? Try mentioning one of these commands
  • Irked by cyberspying, Georgia outs Russia-based hacker -- with photos

    Posted October 30, 2012 - 7:44 am

    In one of the photos, the dark-haired, bearded hacker is peering into his computer's screen, perhaps puzzled at what's happening. Minutes later, he cuts his computer's connection, realizing he has been discovered.
  • Breach prevention is dead. Long live the 'secure breach'

    Posted October 29, 2012 - 5:41 pm

    Every defense paradigm has a finite life span and the IT industry's breach prevention paradigm, which is based on perimeter technology designed to keep the bad guys out, is completely out of step with today's threat landscape. It's time to move on to a new era: the "secure breach" era.
  • Barnes & Noble halts use of PIN pad devices after data breach

    Posted October 24, 2012 - 9:43 pm

    Barnes & Noble has removed PIN pad devices from all of its nearly 700 stores nationwide as a precaution after detecting evidence of tampering with the devices at 63 of its stores in eight states.
  • White Paper

    Performance Analytics: How Normal is Your Data

    Posted October 24, 2012 - 12:30 am

    This VMware paper takes a technical look at a variety of IT performance data (operating system metrics, quality-of-service metrics, business performance metrics, etc.) to determine how well these metrics can be modeled as "normally distributed." This concept is at the heart of VMware vCenter Operations' performance analytics capability, and provides a deeper insight into how the technology helps adapt and learn typical IT behaviors to then provide automated policies that keep alerts and outages in check.
  • White Paper

    Disaster Recovery Exercises Fall Short of the Finish Line

    Posted October 23, 2012 - 7:30 pm

    Though many enterprises have advanced disaster recovery technologies put in place, they still fall short when it comes to actual preparedness due to a lack of formal processes and a strict regimen for exercising DR plans. This report details 10 tips for updating and improving your current DR exercise program to help you meet expected recovery objectives when faced with an unexpected event.
Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.

     

    Learn more

Join today!

See more content
Ask a Question