Data Protection

Data Security | News, how-tos, features, reviews, and videos

concentric rings of digital security with a lock at the center
quantum

6 password

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier.

agile devops

How lean development improved software security at Fannie Mae

Continual improvement methodologies strengthen security, shorten dev cycles and help the c-suite see infosec’s value.

European Union, EU

General Data Protection Regulation (GDPR): What you need to know to stay compliant

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

01 hot products at rsa 2018

Hottest cybersecurity products at RSA 2018

Here's a quick run-down of some of the new products announced at the conference, or shown there for the first time.

data breach thinkstock

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

abstract data stream

Avoiding security event information overload

Choose a security event information management (SEIM) vendor that helps you focus on only the security event data that needs to be investigated.

futuristic user interface - digital transformation

What is security’s role in digital transformation?

Digital transformation is front of mind for many senior executives, but too often security is left behind.

7 data driven

Is your defensive security data-driven?

Data-driven defense uses an organization's own data to identify and mitigate the most important threats. Sounds good, but adoption will be met with resistance.

rules procedures guidelines process structure

SEC's new cybersecurity guidance falls short

Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed.

4 compliance

14 top tools to assess, implement, and maintain GDPR compliance

Running behind on meeting the EU’s new GDPR privacy rules? These tools can help you meet the requirements and stay in compliance by deadline.

iot threats security

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

internet security privacy

What is personally identifiable information (PII)? How to protect it under GDPR

The EU's General Data Protection Regulation requires companies to protect the privacy of their EU customers. That means keeping personally identifiable information (PII) safe. Here's what you need to know.

patching against ransomware

The two most important ways to defend against security threats

Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.

SHEp17
video

Spectre and Meltdown | Salted Hash Ep 17

What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.

bitcoin currency blockchain finance bank binary

6 use cases for blockchain in security

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection.

continuous authentication

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

Load More