Data Security

Data Security | News, how-tos, features, reviews, and videos

7 data driven

Is your defensive security data-driven?

Data-driven defense uses an organization's own data to identify and mitigate the most important threats. Sounds good, but adoption will be met with resistance.

rules procedures guidelines process structure

SEC's new cybersecurity guidance falls short

Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed.

net neutrality

Will the end of net neutrality be a security nightmare?

Effects of the net neutrality repeal are hard to predict, but there could be additional costs for using endpoint security tools if data rates rise. Best advice: Stay the course on security for now.

cyber attack virus meltdown

How bad are Meltdown and Spectre?

Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments.

Big data analytics hand touchscreen user man

Risk management is all about the data; security should be, too

Bay Dynamics takes a data-driven approach to helping companies identify and address the real security threats based on asset value.

03 cryptography

Are you crypto-agile?

A recent spate of successful attacks against our most popular and trusted cryptographic algorithms has me hoping that all companies understand the importance of crypto-agility.

cyber security

What is cyber security? How to build a cyber security strategy

Organizations face many threats to their information systems and data. Understanding all the basic elements to cyber security is the first step to meeting those threats.

predictions crystalball

Our top 7 cyber security predictions for 2018

Let’s face it: 2017 was a terrible year for cyber security with more phishing scams, ransomware, state-sponsored attacks, and new attack vectors. Will 2018 be better?

artificial intelligence / machine learning

AWS raises machine learning expectations for cloud security

AWS's new GuardDuty and Macie offerings unleash the power of machine learning to secure your data. Are they right for your enterprise?

virtualization

What are shielded virtual machines and how to set them up in Windows Server

Virtualization can expose data and encryption keys to hackers. Microsoft's shielded virtual machines and Host Guardian Service locks them down.

phishing threat

Types of phishing attacks and how to identify them

Phishing comes in many forms, from spear phishing, whaling and business-email compromise to clone phishing, vishing and snowshoeing. Here's how to recognize each type of phishing attack.

state of infosec 2018 intro

Information security, 2018: What we have here is a failure to plan

Information security increasingly has a place in corporate leadership, but plenty of companies are still failing to make the plans they need to keep up.

10 threat landscape apocalypse ruins

How to survive the worsening cyber threat landscape

Industry and government cybersecurity experts offer advice for protecting business assets and reputation in an increasingly dangerous cyber threat landscape.

malware cybersecurity skull crossbone

What is a fileless attack? How hackers invade systems without installing software

Cyber criminals don't need to place malware on your system to get in. Fileless or zero-footprint attacks use legitimate applications or even the operating system.

The best ethical hacking courses and certifications

Becoming a certified ethical hacker, also called a penetration tester, is a popular goal among information security professionals. Here are your best options for reaching it.

security password lock biometric fingerprint

Want stronger passwords? Understand these 4 common password security myths

Yes, password length and complexity matter, but only if you apply those qualities to the proper security context.

bos17 networking security lg

Bossie Awards 2017: The best networking and security software

InfoWorld picks the top open source software for protecting networks and their users

Robot Artificial Intelligence chat bot

How to protect chatbot data and user privacy

Employees and customers often enter sensitive information during chatbot sessions, but you can minimize chatbot security and privacy risks.

What business can learn from the Equifax data breach

Security professionals need a systematic analysis process to make sure they aren’t the next Equifax when customer data is compromised.

cybersecurity stock

How Windows to Go can protect data for business travelers

Worried about workers traveling internationally with sensitive company data on a laptop? A Windows to Go USB stick might be the answer for intrusive searches or bans on airplanes.

Load More