Data Protection

Data Protection news, information, and how-to advice


LaCie compromised for over a year

I guess there is truth in the saying that the devil is in the details. If anyone ever tries to tell you that their product or service is 100% secure you have my permission to smack them with a large fish (not an actual permission).

ssl secure browser lock

Bugcrowd launches funding drive to audit OpenSSL

Bugcrowd, the bug bounty marketplace driven by crowdsouring, has launched a donation campaign in order to help pay for a security audit of OpenSSL.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

Small businesses could benefit from wireless industry 'kill switch' plans

Participants like Apple, AT&T, Google, and Verizon Wireless agree to provide "baseline anti-theft tool"

Can Heartbleed be used in DDoS attacks?

With nearly every major threat to information security, it is not long before security experts ask the question, "Can the threat play a role in distributed denial of service (DDoS) attacks?" When it comes to Heartbleed, some people...

Tools

Your no-fuss, fail-safe guide to protecting Android devices

As Android's popularity continues to climb, it's increasingly joining the workplace. In its early days, Android had little in the way of security, relegating it to personal use. But over the years, Google has upped the ante in terms...

In Depth

How a cyber cop patrols the underworld of e-commerce

Cyber "cop" for e-commerce platform Payza tracks illegal, unethical websites and works to put them out of business

Cloud Computing eGuide

In this eGuide, CIO, Computerworld, and InfoWorld offer advice, tips, news, and predictions regarding cloud implementations in the coming year and beyond. Read on to learn how to make cloud work for your organization.

3 ways to reduce BYOD legal liability with the right conversation

As "bring your own device" (BYOD) reshapes the way organizations handle technology, how do we handle the uncertainty of legal liability and security concerns? The key to turning a potential liability into an opportunity lies in having

Organizations suffer SQL Injection attacks, but do little to prevent them

Respondents taking part in a new study from the Ponemon Institute say they've had their eyes opened to the realities of SQL Injection, and the impact it has on their organization.

Black Hole Cygnus

Big data security context

Cyber attacks have greater range than a jet fighter or ICBM, regardless of whether they're perpetrated by nation-states, cyber criminals or activists. To address this issue, organizations are trying to optimize their use of big data...

whatsapp ios

FTC warning unlikely to stop Facebook from changing WhatsApp privacy policies

Despite pressure from the Federal Trade Commission, Facebook is unlikely to leave WhatsApp's stricter privacy policies intact, once government regulators approve the $19 billion acquisition, privacy experts say.

Why Projects Fail

CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.

heartbleed bug

Heartbleed flaw still exists at Disqus, ShareThis, and 46 other cloud apps

More than half of the apps Netskope identified as vulnerable to Heartbleed have been patched, but 48 remain at risk.

heartbleed
breaking

Heartbleed vulnerability linked to breach of Canadian tax data

The Canada Revenue Agency (CRA), Canada's tax-collection agency, confirmed in a statement on Monday that the Heartbleed vulnerability was to blame for the loss of tax-related information.

Slideshow

Best browsers for safe surfing

Spikes AirGap, Invincea FreeSpace shine in test of eight specialized browsers

jetpack logo

Jetpack for WordPress pushes patch for two year-old flaw

The developers behind Jetpack, one of WordPress' most popular plugins, have patched a serious flaw introduced in 2012 that would enable an attacker bypass access controls and publish posts to any website hosted on the blogging...

Why Projects Fail

CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.

heartbleed 1200x700

Here are the options with Heartbleed-flawed networking gear (Hint: there aren't many)

Companies faced with the threat posed by networking equipment that contains the notorious Heartbleed bug have few security options beyond working closely with affected vendors.

How you need to respond to Heartbleed, and how you can explain it to others

With the flood of information surfacing about Heartbleed, it is important to distill to the immediate steps to take to protect our organizations and those we serve. This article covers the five actions for organizations, three for...

heartbleed

Entrust offers new certificates in wake of Heartbleed

As the Internet comes to grips with the scope of the impact from the Heartbleed vulnerability, Entrust is trying to help restore security.

The Internet of Things: An exploding security minefield

With small, underfunded developers crowding the IoT market, the need for security awareness, education and training is crucial, say Duo Security researchers

Load More