Data and Information Security

Data and Information Security | News, how-tos, features, reviews, and videos

rocket launch startup cloud success growth badge
Quantum computing / security

big data merger and acquisition big business smb

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.

User ID + password / credentials / authentication

SSO explained: Single sign-on definition, examples, and terminology

Single sign-on (SSO) is a user authentication service that allows a user to access multiple applications with one set of login credentials. Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

5 cryptography and data protection

What is cryptography? How algorithms keep information secret and safe

Cryptography is the art of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.

Encryption  >  A conceptual technological lock and encrypted code.

QuSecure launches end-to-end post-quantum cybersecurity solution

QuSecure claims new solution is the industry’s first end-to-end quantum software-based platform that protects encrypted communications and data using a quantum-secure channel.

https ssl certificate

How to choose a certificate management tool

Managing certificates that hold all your encryption secrets is impossible without the right tool. Here's how to narrow the field.

bank vault bank hacked breach security breach binary numbers by negative space and peshkov getty im

Cohesity launches FortKnox to protect data from ransomware attacks

The data management vendor is adding strong data isolation and recovery capabilities with its latest software-as-a-service release, FortKnox.

Quantum computing / security

U.S. White House releases ambitious agenda to mitigate the risks of quantum computing

The Biden administration issued an executive order to ensure U.S. leadership in quantum computing and a memorandum to mitigate its security risks.

hybrid cloud

Dell offers data, app recovery support for multicloud assets

Dell is adding data recovery solutions to its APEX portfolio, for data centers and public clouds including Azure and AWS.

Encryption  >  A conceptual technological lock and encrypted code.

PureVPN introduces quantum-resistant feature to enhance security, tackle threats

VPN provider has partnered with quantum computing company Quantinuum to deploy quantum-resistant encryption keys.

A man casts the shadow of an ominous hooded figure against a circuit-based wall.

JHL Biotech's theft of Genentech data holds lessons for infosec

Genentech employees stole the company's data on behalf of JHL Biotech for years. What could they have done to spot the theft sooner?

quell cyber attacks primary

What is the cyber kill chain? A model for tracing cyberattacks

The cyber kill chain describes the phases of a targeted cyberattack where defenders can identify and stop it.

Social engineering  >  Laptop user with horns manipulates many social media accounts

Meta, Apple emergency data request scam holds lessons for CISOs

Fake requests from law enforcement gave cybercriminals access to sensitive customer data. It's a signal for CISOs to work with business to review and update processes for these requests.

CSO  >  Botnet  >  Robots amid a blue binary matrix

What is a botnet? When infected devices attack

A botnet is a collection of internet-connected devices that an attacker has compromised to launch DDoS attacks, spread phishing spam, mine bitcoin, and more.

security internet network encryption privacy padlock

What is SSL? How SSL certificates enable encrypted communication

SSL and its descendent, TLS, are protocols that encrypt internet traffic, making secure internet communication and ecommerce possible.

cso security hacker breach ransomeware gettyimages 1081349274 by sestovic 2400x1600px

What is ethical hacking? Getting paid to break into computers

Learn the ethical hacking certifications, training, and experience you need to land a job testing an organization's defenses.

Encryption  >  A conceptual technological lock and encrypted code.

Preparing for the quantum-safe encryption future

Organizations soon need to transition to quantum-safe encryption to address new cybersecurity threats. Here’s how businesses can prepare.

An engineer reviews strategy framework data.

NIST seeks information on updating its Cybersecurity Framework

Security community welcomes the update, but a U.S. GAO report cites slow adoption among government.

Network encryption / encrypted data transfers

LiveAction tackles encryption blindness with new offering

ThreatEye NV combines behavior analysis and machine learning to expose malware in encrypted network traffic.

Load More
You Might Also Like