Data and Information Security

Data and Information Security | News, how-tos, features, reviews, and videos

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock
CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

A man casts the shadow of an ominous hooded figure against a circuit-based wall.

Coca-Cola trade secret theft underscores importance of insider threat early detection

A research engineer used basic exfiltration techniques to steal trade secrets from Coca-Cola, but wasn't caught until she attempted to steal similar data from another company.

Encrypted blocks of multicolored data cubes rolling out.

What's next for encryption if the RSA algorithm is broken?

A recent, yet to be proven paper claiming to have found a way to "destroy the RSA cryptosystem" has cryptographers asking what might replace it.

vcmar constantin finnegan
video

Keeping a remote workforce secure: Lessons learned, tips for the future

CSO’s Lucian Constantin joins Computerworld’s Matthew Finnegan and Executive Editor Ken Mingis to explain what companies should do to keep their remote employees — and valuable corporate data and info — safe. Secure remote access is...

women spinning plates asynchronous programming synchrony multi tasking by graemenicholson getty ima

10 pioneering women in information security

As Women's History Month comes to close, we introduce you (hopefully not for the first time) to some women who broke new ground in infosec, national security, and computer science.

padlock / Domain Name System / DNS / ICANN / security

DNS over HTTPS, DNS over TLS explained: Encrypting DNS traffic

DoT and DoH provide data confidentiality with end-to-end encryption for DNS traffic, but each has trade-offs.

library / repository / binders and boxes on shelves in a large archive

The 7 deadly sins of records retention

Record retention is both a fact of life and a growing headache for organizations burdened by a spiraling number of regulations and legal obligations. Here are worst (and best) practices for securing data and documents.

A circuit board with CPU / chip displaying glowing binary code.

Intel, Microsoft join DARPA effort to accelerate fully homomorphic encryption

The partnership aims to improve performance and accuracy of FHE to make it practical for business and government to better protect confidential data in the cloud.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Cybersecurity in 2021: Stopping the madness

The challenges are greater than ever. But security pros have learned a lot – and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks.

mobile security

8 mobile security threats you should take seriously

Mobile malware? Other mobile security threats are more pressing. Every enterprise should have its eye on these eight issues.

A virtual sphere of photos of individuals appears against a cityscape.

Security job candidate background checks: What you can and can't do

Enterprise cybersecurity begins with a trustworthy staff. Here's how to ensure that current and prospective team members aren't hiding any skeletons.

interconnecting gears / process / automation / machinery / mechanism / efficiency

Inrupt offers a standard for controlling data and identity on the web

Founded by security and web luminaries, Inrupt has commercialized the Solid Project technology to manage sensitive data in a more secure, compliant manner...if enough people buy into its vision.

An open padlock with green check mark allows data to flow freely [lax security/data loss prevention]

How to select a DLP solution: 9 unusual considerations

Data loss prevention systems have become more complex, and each has evolved differently. Here’s how to select a DLP system based on required functionality and its real-life ability to prevent data leaks.

human weak link cybersecurity primary

Supply chain attacks show why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

Email encryption  >  An encrypted binary 'at' symbol with a keyhole.

3 top enterprise file encryption programs compared

Any of these encryption apps can safeguard a file’s contents, but differ in terms of supported platforms, remote capabilities, and features.

A large 'X' marks a conceptual image of a password amid encrypted data.

Hashing explained: Why it's your best bet to protect stored passwords

Hashing is a cryptographic process that makes it harder for attackers to decrypt stored passwords, if used correctly.

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

abstract data flows / data streams

Differential privacy: Pros and cons of enterprise use cases

Hiding sensitive data in a sea of noise might have more value than encryption in some use cases. Here are the most likely differential privacy applications and their trade-offs.

Compliance

12 new state privacy and security laws explained: Is your business ready?

States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. Let's break down what each of these laws entails and how businesses and consumers are affected.

Load More