Data Protection

Data protection news, software and solutions, and analysis for IT professionals
  • Out of Africa: Analytics for a better world

    Posted April 19, 2012 - 8:00 am

    Analytics is just one more tool for policymakers and authorities to respond to a crisis. However, unlike other technologies, analytics delivers precise information to those who need it most, when they need.
  • White Paper

    Security Management 2.0: Time to Replace Your SIEM?

    Posted April 18, 2012 - 5:00 pm

    Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn more.
  • White Paper

    Transitioning from SIEM to Total Security Intelligence

    Posted April 18, 2012 - 5:00 pm

    Learn how security intelligence, powered by next-generation SIEM and log management, enables organizations from Fortune 500 companies to mid-sized enterprises and government agencies to maintain comprehensive and cost-effective information security.
  • Next big security risk for home users: Internet connected TV

    Posted April 18, 2012 - 3:25 pm

    Security gurus have been demonstrating the risk of 'smart' TVs and appliances, that support the web but not decent security. Smart malware, spear phising and the demand for botnets may finally get global, commercial hacking operations aim not at your laptop, but your TV.
  • New Mac malware gets newer; now available from Word docs as well as Java

    Posted April 17, 2012 - 10:22 am

    Mac users may not want to hear it, but the debut today of a new version of a Trojan whose original version is less than a month old,shows malware writers are much more prompt about updating software for Macs than app developers ever were in porting Windows products to it.
  • Source of Apple's malware problem: arrogance, negligence, contempt

    Posted April 16, 2012 - 7:57 pm

    The Flashback botnet was labeled as the big breakthrough that would make Apple and its users realize malware for the Mac was real. Instead it made clear that, whenever Apple users need it to step up and take responsibility for a major flaw, Apple steps back and points fingers instead.
  • White Paper

    The SMB Top Choice for Virtualization

    Posted April 16, 2012 - 2:10 pm

    Protect your business with vSphere, the industry's leading virtualization platform, which provides built-in business continuity for all your applications.
  • White Paper

    HP Virtualization Smart Bundles with VMware: Simple, Cost-effective Virtualization Solutions

    Posted April 16, 2012 - 12:00 pm

    Virtualization can assist you reduce costs and simplify IT management. However, getting started can be challenging. HP Virtualization Smart Bundle can help.
  • Webcast

    Optimizing the world of IT for end-users: Balancing freedom and choice with security and compliance to meet business

    Posted April 16, 2012 - 12:00 pm

    Download this eSeminar to hear from experts Ziff Davis Enterprise, VMware and HP and learn how client-side virtualization can improve your organization's performance, while reducing the IT burden of managing and maintaining an increasingly diverse client universe.
  • Weak passwords still the downfall of enterprise security

    Posted April 15, 2012 - 7:25 am

    A recent data breach that exposed the Social Security numbers of more than 255,000 people in Utah has once again highlighted the longstanding but often underestimated risks posed to organizations by weak and default passwords.
  • Hospitals seeing more patient data breaches

    Posted April 14, 2012 - 7:50 am

    A bi-annual survey of 250 healthcare organizations shows that the percentage experiencing a patient data breach is up. And with the growth in electronic records-keeping, more of those problems are originating from laptops and mobile devices rather than a human slip-up in handling paper documents.
  • Boeing, NSA phones hint build-your-own may be only way to make Android secure

    Posted April 13, 2012 - 3:38 pm

    NSA and now Boeing have taken the extraordinary step of building their own version of an Android smartphone to get decent security. NSA's plans and Boeing's product will both be public, but is Android security really so bad DIY is the only way to get a version that doesn't leak data?
  • Fearing for safety, LulzSec, Anonymous stool pigeon Sabu skips court date

    Posted April 12, 2012 - 2:55 pm

    Hector 'Sabu" Monsegur, 28, the LulzSec leader who spent months collecting evidence to help the FBI arrest LulzSec and Anonymous contacts said he was too afraid of threats on his life to appear at court to answer charge of impersonating a federal agent.
  • Webcast

    Close a Dangerous Vulnerability: Automated Methods for Managing Admin Rights

    Posted April 11, 2012 - 5:10 pm

    In this exclusive webcast from Viewfinity, you'll hear how to leverage Group Policy Object settings to close this vulnerability by elevating privileges for standard users.
  • Cell carriers launch anti-theft effort they could have started in 1996

    Posted April 10, 2012 - 6:00 pm

    The four big U.S. cell carriers announced this morning they are joining the FCC and local chiefs of police to launch an anti-theft program that will brick any cell phone stolen in the U.S., permanently, using databases and capabilities carriers already own. It will start in six months.
  • Utah breach 10X worse than originally thought

    Posted April 10, 2012 - 7:42 am

    The scope of a data breach involving a Medicaid server at the Utah Department of Health is much worse than originally thought.
  • Charities expose almost 500K Social Security numbers by filing their own taxes

    Posted April 9, 2012 - 3:44 pm

    Identity theft prevention vendor Identity Finder sifted through 3 million non-profit tax returns looking for accidental revelations of private data. They found almost half a million posted in public documents, 171,000 of which were unique.
  • Denials don't fix Facebook security flaw on iOS, Android

    Posted April 6, 2012 - 9:45 am

    Facebook is trying to spin the news of a security flaw in its smartphone apps that would allow malwareto steal credentials, which are stored unencrypted and unsecured. The hack works on any iOS or Android phone, researchers say, not just those stolen or jailbroken, as FB claimed.
  • U.K.'s Sky News weasels on justification for hacking emails

    Posted April 5, 2012 - 5:03 pm

    Sky News is trying to justify hacking the email of the two main figures in an insurance-fraud story, because it was so vital to the public interest that Sky reveal details of a plot in which a man faked his own death, after he'd already pled guilty to seven counts of fraud.
  • Webcast

    Data Retention Starts with Backup & Ends with Archive

    Posted April 4, 2012 - 1:00 pm

    Archiving and Backup are the foundation of the next generation of information governance. However, commodity data protection tools and basic archives are only good for storing data. In the changing IT landscape, understanding what you are keeping, when to delete, and delivering insight to the business from your data is the future of these systems. Join us to hear the impact of private and public cloud solutions, "big data" and your choices while market evolves.
  • White Paper

    vSphere Storage Appliance Technical White Paper

    Posted April 4, 2012 - 9:40 am

    This technical white paper covers the the vSphere® Storage Appliance (VSA) architecture, deployment of a VSA cluster, and basic monitoring and management. Discover that VSA is resilient and easy to deploy, while enabling you to use advanced vSphere features like vSphere HA, vMotion®, and vSphere DRS.
  • Path tightens mobile app security

    Posted April 3, 2012 - 9:32 pm

    Social networking service Path has upgraded the security of its mobile application in apparent response to a recent outcry over its data gathering practices.
  • Pastebin tries to ditch hacked content; Anonymous is unlikely to leave

    Posted April 3, 2012 - 4:23 pm

    Anonymous text-posting site Pastebin has been the place hacktivists of all stripes have come to post their trophies. Files full of private data, source code from big vendors, threats to take down the Internet. If Pastebin goes straight, where will Anonymous' content go?
  • Android rootkit poisons apps that give users root control

    Posted April 3, 2012 - 3:43 pm

    A rootkit designed to install itself with pirated or root-access apps sneaks past users, gets them to give it root access, and keeps control by replacing critical Android system software with versions of its own. Does that mean users shouldn't root their phones to avoid infection?
  • Should you keep cell phones away from sensitive data?

    Posted April 3, 2012 - 1:49 pm

    The number, variety and abilities of smartphone exploits is growing exponentially, but few talk about the risk phones pose as entry points, not as a source of data leaks. Even if they're banned from sensitive areas, how can you keep them out without frisking everyone at the door?
Join us:






Data ProtectionWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question