Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

4120913056 d1931898b4 o
atm cash machine money

guccifer hacker romanian

Celebrity hacker Guccifer's confession gives us all a lesson in security

A Romanian hacker known online as Guccifer pleaded guilty to hacking into 100 email and social media accounts belonging to American citizens, including former high-ranking government officials.

senator orrin hatch

Senators want warrant protections for US email stored overseas

A new bill in Congress would require U.S. law enforcement agencies to obtain court-ordered warrants before demanding the emails of the country's residents when they are stored overseas.

puzzle pieces

Critical IT policies you should have in place

When we talk to clients as part of an IT audit we often find that policies are a concern, either the policies are out of date or just not in place at all. This often stems from the fact that no-one has been assigned to a permanent...

maze confused insure future

Catch insider threats with User Behavior Analytics

Securing and protecting confidential data and Intellectual Property (IP) assets has been always a challenge for organizations despite having various tools including data loss prevention (DLP) added to the cybersecurity strategy....

internet of things graphic

IoT security is getting its own crash tests

The thousands of endpoints in IoT systems may have to protect themselves against thousands of dangers. A decades-old IT lab wants to tell you if they’re up to the task.

sharing business secrets

Do you know where your trade secrets are?

Cyber enabled theft of trade secrets is one of the security challenges of our time. In fact financial losses from trade secret theft dwarf those from privacy breaches. This post defines and describes trade secrets and an approach to...

w 2 form

The frustrating aftermath of a data breach at American Type Culture Collection

In April, American Type Culture Collection (ATCC) was targeted by a Phishing attack seeking W-2 records. The attempt was successful, leaving employees stressed about their finances and the long-term impact this breach could have on...

domain names tld

Top-level domain expansion is a security risk for business computers

The explosion of new generic top-level domains (gTLDs) in recent years can put enterprise computers at risk due to name conflicts between internal domain names used inside corporate networks and domains that can now be registered on...

harvard university

Deferring Harvard for a cybersecurity start-up

Why the gap year is fruitful for students and great for the enterprise

nyse stock trading

Regulators: cybersecurity poses biggest risk to global financial system

Last week, the chair of the Securities and Exchange Commission called cybersecurity the biggest risk facing the global financial industry. The SEC promises to step up regulation and Swift itself is expected to launch a new cyber...

spoofing 1

5 active mobile threats spoofing enterprise apps

Enterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it spells trouble for IT departments everywhere. Here are 5 apps that masquerade as real apps.

apple campus headquarters stock

Apple hires mobile encryption pioneer amid encryption debate

Apple revealed Tuesday that it rehired a security expert who has a background as a mobile encryption pioneer, as the company continues to face scrutiny from governments wanting more access to its products.

Internal Revenue Service IRS tax filing form 1040

Five arrested for impersonating the IRS, listen to a recorded scam in progress

Five people have been arrested in Miami who are said to be responsible for scamming 1,500 people out of more than $2 million by impersonating IRS agents. Their scams centered on contacting individual taxpayers out of the blue and...

disaster recovery plan ts

Disaster recovery in a DevOps world

Organizations that are adopting DevOps methodologies are realizing actual benefits from taking that approach.

massachusetts state house

US state officials worry about their ability to respond to cyberattacks

Many U.S. states aren't confident in their ability to respond to cyberattacks on physical infrastructure such as water and electric systems, some emergency response officials said.

insider threats

By the numbers: Cyber attack costs compared

Not all cyber attacks are created equal. Here's an at-a-glance look at what are the most expensive cyber attacks, how costs are distributed, and where organizations are putting their money.

t 34 rocket launcher france

New DMA Locker ransomware is ramping up for widespread attacks

A new ransomware program called DMA Locker has reached maturity and shows signs of being distributed in widespread attacks.

managed security service providers

Security training programs don't do enough to mitigate insider risk

The threats posed by negligent insiders top many security professionals' lists of security concerns, but even organizations that have data protection and privacy training programs aren't getting through to their employees.

Load More