Data Protection

Data Security | News, how-tos, features, reviews, and videos

data security
human weak link cybersecurity primary

Mobile security

6 mobile security threats you should take seriously in 2019

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these issues in the coming year.

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

risk assessment - safety analysis - security audit

Wanted: Data breach risk ratings, because not all breaches are equal

We need a system for data breaches that rates the real risk associated with the compromised data.

botnet bots

What is a botnet? And why they aren't going away anytime soon

A botnet is a collection of any type of internet-connected device that an attacker has compromised. Commonly used in distributed denial of service (DDoS) attacks, botnets can also take advantage of their collective computing power to...

agile devops

How lean development improved software security at Fannie Mae

Continual improvement methodologies strengthen security, shorten dev cycles and help the c-suite see infosec’s value.

European Union, EU

General Data Protection Regulation (GDPR): What you need to know to stay compliant

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

01 hot products at rsa 2018

Hottest cybersecurity products at RSA 2018

Here's a quick run-down of some of the new products announced at the conference, or shown there for the first time.

data breach thinkstock

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

abstract data stream

Avoiding security event information overload

Choose a security event information management (SEIM) vendor that helps you focus on only the security event data that needs to be investigated.

7 data driven

Is your defensive security data-driven?

Data-driven defense uses an organization's own data to identify and mitigate the most important threats. Sounds good, but adoption will be met with resistance.

rules procedures guidelines process structure

SEC's new cybersecurity guidance falls short

Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed.

continuous authentication

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

net neutrality

Will the end of net neutrality be a security nightmare?

Effects of the net neutrality repeal are hard to predict, but there could be additional costs for using endpoint security tools if data rates rise. Best advice: Stay the course on security for now.

learn basics of ethical hacking

What is ethical hacking? Penetration testing basics and requirements

Ethical hacking, also known as penetration testing, is legally breaking into computers and devices to test an organization's defenses. Here’s what ethical hacking entails and tips for breaking into the role.

cyber attack virus meltdown

How bad are Meltdown and Spectre?

Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments.

Big data analytics hand touchscreen user man

Risk management is all about the data; security should be, too

Bay Dynamics takes a data-driven approach to helping companies identify and address the real security threats based on asset value.

03 cryptography

Are you crypto-agile?

A recent spate of successful attacks against our most popular and trusted cryptographic algorithms has me hoping that all companies understand the importance of crypto-agility.

cyber security

What is cyber security? How to build a cyber security strategy

Organizations face many threats to their information systems and data. Understanding all the basic elements to cyber security is the first step to meeting those threats.

Load More