Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

lenovo tablet display
bulgarian street

cybersecurity boards

Pure play cybersecurity firms in your backyard

These are cyber fighters you can dial up if the growing cybercrime epidemic has you on the edge.

dido harding ceo of talktalk

Police arrest blackmail suspect in TalkTalk data breach case

Police believe they may have found the person who tried to blackmail the CEO of TalkTalk, the U.K. telecommunications company that was the target of a data breach.

turkey balloon float macys thanksgiving day parade

10 reasons for CSOs to be thankful

The attack surface continues to expand and has made the job of the CSO increasingly complex and challenging. It’s not just technology alone anymore but increasingly it takes the village to secure the enterprise.


This gizmo knows your Amex card number before you've received it

A device built by legendary hacker Samy Kamkar calls into question the security of payment cards as the U.S. continues to grapples with card fraud.

dell xps 13 15

And then there were two: Another dangerous Dell root certificate discovered

After Dell confirmed that one of its support tools installed a dangerous self-signed root certificate and private key on computers, users discovered a similar certificate deployed by a different Dell tool.

hilton istanbul exterior hr

Hilton says malware targeted its credit card system

Hilton Worldwide says it has identified and removed malware that targeted card payment systems at some of its hotels over a 17-week period from late 2014 to mid 2015.

victim identity theft computer problem

What you need to know about Dell's root certificate security debacle

In an attempt to provide a more streamlined remote support experience, Dell installed a self-signed root certificate and corresponding private key on its customers' computers, exposing users' encrypted communications to potential...

black friday

Retailers targeted by sophisticated ModPOS malware

The ModPOS malware has already hit multiple national retailers and compromised millions of cards, according to new research released this morning, but there are likely to be more infections still out there since this particular...

encryption yiaw4a

An encryption back door won’t actually help intelligence agencies

Intelligence agencies and law enforcement claim they need a back door in encryption algorithms for safety and national security, but the logic is flawed and the fallout from an encryption back door would do more harm than good.

breach repair

Good news for security leaders on breach preparedness efforts

Good news for security leaders on their breach preparedness efforts with pointers on where to focus for further gains

Fortinet names Tyson Macaulay Chief Security Strategist and VP of Consulting Services

Fortinet on Monday announced that it has hired security industry veteran Tyson Macaulay as chief security strategist and vice president of consulting services.

lockheed martin assembly

How Lockheed Martin, Cisco and PWC manage cybersecurity

Forget systems … it’s your own people who are your greatest security threats. Luckily, and with training, they can also be your first line of defense.

word magnets

Infosec jobs: Use keywords to boost your LinkedIn ranking

Hiring experts share the keywords you must use to rise to the top of LinkedIn searches for security professionals.

broken window glass crack holes

Five reasons why hackers easily get in

Vulnerable web application is a great gift for hackers, as it significantly reduces their time, cost and efforts to get into corporate network. Why companies fail to secure their web apps?

dell logo

Dell support tool responsible for eDellRoot problems

The self-signed root certificate that has left Dell customers at risk was placed on affected systems after an August update to the Dell Foundation Services application.

dell booth

Dell puts privacy at risk with dangerous root certificate

Dell has come under fire for shipping PCs with a pre-installed trusted root certificate that can be used to compromise the security of encrypted HTTPS connections. The issue is similar to one Lenovo customers faced after the company...

data breach

Damballa warns that the enemy may already be in your network

Researchers from Damballa analyze the malware behind the Sony and Saudi Aramco breaches to figure out how it was able to remain undetected for so long.

satya nadella microsoft

Microsoft CEO takes a collaborative approach to cybersecurity

Microsoft CEO Nadella talks of company's role in an ‘ecosystem,’ saying partnerships and top-to-bottom protection and detection critical to battle emerging security threats.

Load More