Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

healthcare it
3147352

w 2 form

'Tis the season to watch out for W-2 phishing scams

Earlier this month, the IRS sent out an urgent alert warning employers that this W-2 phishing scam had spread beyond the corporate world to other sectors, including school districts, tribal organizations and nonprofits

binoculars desert

5 ways to spot a phishing email

Think you're clever enough to recognize a phishing attempt? Think again. Cybercriminals are getting smarter and their phishing skills are getting better, but we've put together this list of clues to help you avoid a costly error.

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways.

heart monitor

FDA 'guides' the way to medical device security

The FDA’s “guidance” documents on medical device security are non-binding. But advocates say they will still have plenty of legal force – especially when it comes to things like insurance or civil suits for damages from insecure...

cybersecurity boards

Emboldening the CISO ecosystem

Cybersecurity recruitment and leadership advisor, Stephen Spagnuolo of ZRG Partners, discusses how the inaugural launch of the peer to peer HMG Strategy CISO Executive Leadership Summit will lead the way on strengthening the range,...

Black Hat 2015

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

23922465470 fe3c8b8cdf o

Verizon knocks off $350M from Yahoo deal after breaches

Verizon Communications will pay US$350 million less for Yahoo after two major data breaches reported by the struggling internet pioneer.

bingo sign

Before you buy another cybersecurity buzzword

Your security posture should not be based on assumptions. It should be based on empiric evidence. That empiric evidence can be derived by validating your controls with security instrumentation solutions. You may very well discover...

Gmail Google Mail

Google prevents 10 million malicious emails every 60 seconds; Gmail users beware

Gmail phishing and malware attacks on Gmail users can be prevented

RSA

Here’s how the US government can bolster cybersecurity

Almost 20 years ago, Chris Wysopal was among a group of hackers who testified before U.S. Congress, warning it about the dangers of the internet.

trump sign immigration eo

​Poach cyber experts from Trump’s banned countries: InfoTrust CEO

InfoTrust CEO Dane Meah has called on the Australian government to take advantage of US president Donald Trump’s controversial immigration policy and help local organisations poach cyber security experts from banned countries.

webcam laptop

9 new hacks coming to get you

The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm

kosakker russian

Hackers behind bank attack campaign use Russian as decoy

The hackers behind a sophisticated attack campaign that has targeted financial organizations around the world have intentionally inserted Russian words and commands into their malware in an attempt to throw investigators off.

phone privacy

True privacy online is not viable

You can hide from casual observers, but a motivated person will see through your attempts at anonymization.

0 shadow it intro

8 steps to regaining control over shadow IT

Learn how to discover those employees who went roaming for outside services.

3 bitcoin

Would killing Bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts explain that doing away with the cybercurrency would just force cybercriminals to find another anonymous way to extort money.

connected nodes network

Understanding the attack surface to better allocate funds

How CISOs can be better informed and get ahead of attacks

Self driving truck

Ride along to solve these data breaches

Verizon’s recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon’s report gets a first-person perspective of the company...

Load More