Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

09 satisfied approval thumbs up
data recovery

china flag

APT3 hackers linked to Chinese intelligence

The APT3 hacker group, which has been attacking government and defense industry targets since 2010, has been linked to the Chinese Ministry of State Security, according to a report by Recorded Future.

08 lawsuit

Stopping Trade Secret Theft in Your Organization, Part II

A brief primer on trade secret law for security professionals.

money ransom

Ransomware damages rise 15X in 2 years to hit $5 billion in 2017

Ransomware damage costs are expected to hit $5 billion in 2017. To keep from becoming a victim, implement these six cybersecurity strategies.

vlc

Malicious subtitles in popular media players could lead to remote compromise

Researchers at Check Point have discovered a flaw affecting several popular media players, which stems from how they process subtitles. If exploited, an attacker could gain remote access to the victim's system. It's estimated that...

phishing threat

Be wary of fake WannaCry fixes

When the WannaCry malware hit, many users were scrambling for fixes -- but some of the proffered solutions were actually just more malware, in disguise

3 auditors

The most common errors identified in professional DNS audits

Chris Roosenraad, director of DNS Services at Neustar, shares some of the most common errors observed during audits of its customer’s DNS infrastructure and the best practices you can take to ensure you are maximizing your DNS...

inside hack theft

China's theft of IBM's intellectual property

Guilty plea of Xu Jiaqiang an IBM employee for theft of intellectual property and economic espioange

anthony grieco
Q&A

Cisco security exec: ‘Connected devices are creating 277 times more data than people are’

CSO Managing Editor Ryan Francis recently spoke with Anthony Grieco, senior director and trust strategy officer at Cisco’s Security and Trust Organization, about how organizations can securely incorporate new technologies as they...

veterans fill cybersecurity gap2

Companies ramp up recruiting veterans as cybersecurity urgency grows

Many veterans have the cybersecurity skills and attitude to be successful in the public sector with the right support.

iran map

Iran espionage capabilities have a powerful bite

Look at the threat posed by IRAN to the United States and elsewhere

ryan benson

A day in the life of a threat researcher

After leaving Exabeam at the end of the workday, Ryan Benson’s mind doesn’t shut off when it comes to thinking about designing new defenses against Black Hats. See what his day looks like.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

8 code driven security

Don't Panic: Breach at software developer shouldn’t affect its customers or its future

A leading independent Mac and iOS development company has chagrin, but says no customer or financial information leaked, nor was its website compromised.

Hurricane Matthew

Suffolk County greets hurricane season with updated alerting system

Last September, as the East Coast prepared for Tropical Storm Hermine, the emergency broadcasting system accidentally sent out an evacuation alert for all of Long Island's Suffolk County. The alert was meant just for Fire Island, but...

shadowy attacker hooded (public domain)

How to maintain data oversight to avoid ‘shadow data’

As more companies take a liberal approach to cloud app provisioning, they need to make sure that all apps – including vetted ones – are carefully secured, optimized and monitored. Al Sargent, senior director at OneLogin, offers the...

security group team circuitry

DHS wargames included a scenario similar to WannaCry

In March of 2016, the Department of Homeland Security conducted a national exercise to see how the government and the private sector would react to a multi-sector cyberattack on critical infrastructure. The scenario included malware...

data protection
Infographic

GDPR requirements raise the global data protection stakes

New European Union data protection rules go into effect in 2018. Will you be ready?

trojan horse virus

Blackmoon banking trojan returns with new framework

Fidelis Cybersecurity describes the new way Blackmoon was delivered to South Korean financial institutions and offers advice for preventing future attacks.

Load More