Data Security

Data Security | News, how-tos, features, reviews, and videos

cyber attack virus meltdown

How bad are Meltdown and Spectre?

Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments.

Big data analytics hand touchscreen user man

Risk management is all about the data; security should be, too

Bay Dynamics takes a data-driven approach to helping companies identify and address the real security threats based on asset value.

03 cryptography

Are you crypto-agile?

A recent spate of successful attacks against our most popular and trusted cryptographic algorithms has me hoping that all companies understand the importance of crypto-agility.

cyber security

What is cyber security? How to build a cyber security strategy

Organizations face many threats to their information systems and data. Understanding all the basic elements to cyber security is the first step to meeting those threats.

predictions crystalball

Our top 7 cyber security predictions for 2018

Let’s face it: 2017 was a terrible year for cyber security with more phishing scams, ransomware, state-sponsored attacks, and new attack vectors. Will 2018 be better?

artificial intelligence / machine learning

AWS raises machine learning expectations for cloud security

AWS's new GuardDuty and Macie offerings unleash the power of machine learning to secure your data. Are they right for your enterprise?

virtualization

What are shielded virtual machines and how to set them up in Windows Server

Virtualization can expose data and encryption keys to hackers. Microsoft's shielded virtual machines and Host Guardian Service locks them down.

phishing threat

Types of phishing attacks and how to identify them

Phishing comes in many forms, from spear phishing, whaling and business-email compromise to clone phishing, vishing and snowshoeing. Here's how to recognize each type of phishing attack.

state of infosec 2018 intro

Information security, 2018: What we have here is a failure to plan

Information security increasingly has a place in corporate leadership, but plenty of companies are still failing to make the plans they need to keep up.

10 threat landscape apocalypse ruins

How to survive the worsening cyber threat landscape

Industry and government cybersecurity experts offer advice for protecting business assets and reputation in an increasingly dangerous cyber threat landscape.

malware cybersecurity skull crossbone

What is a fileless attack? How hackers invade systems without installing software

Cyber criminals don't need to place malware on your system to get in. Fileless or zero-footprint attacks use legitimate applications or even the operating system.

The best ethical hacking courses and certifications

Becoming a certified ethical hacker, also called a penetration tester, is a popular goal among information security professionals. Here are your best options for reaching it.

security password lock biometric fingerprint

Want stronger passwords? Understand these 4 common password security myths

Yes, password length and complexity matter, but only if you apply those qualities to the proper security context.

bos17 networking security lg

Bossie Awards 2017: The best networking and security software

InfoWorld picks the top open source software for protecting networks and their users

Robot Artificial Intelligence chat bot

How to protect chatbot data and user privacy

Employees and customers often enter sensitive information during chatbot sessions, but you can minimize chatbot security and privacy risks.

What business can learn from the Equifax data breach

Security professionals need a systematic analysis process to make sure they aren’t the next Equifax when customer data is compromised.

cybersecurity stock

How Windows to Go can protect data for business travelers

Worried about workers traveling internationally with sensitive company data on a laptop? A Windows to Go USB stick might be the answer for intrusive searches or bans on airplanes.

Internet privacy

Top 5 tools to protect internet privacy

How virtual private networks (VPNs), proxy services, and onion routers help block ISPs (and search engines) from harvesting user data — and which of these internet privacy tools to choose.

Predictions for the Future of Programming

How do you predict cyber attacks? Listen to your Cassandras

Author R.P. Eddy says it is possible to anticipate and prepare for security threats. It requires listening to your data experts and empowering them with the right tools.

quell cyber attacks primary

Why SSL/TLS attacks are on the rise

As more companies adopt better encryption practices, cyber criminals are turning to SSL/TLS vulnerabilities to deliver malicious attacks.

Load More