Data and Information Security
Data and Information Security | News, how-tos, features, reviews, and videos
Inrupt offers a standard for controlling data and identity on the web
Founded by security and web luminaries, Inrupt has commercialized the Solid Project technology to manage sensitive data in a more secure, compliant manner...if enough people buy into its vision.
How to select a DLP solution: 9 unusual considerations
Data loss prevention systems have become more complex, and each has evolved differently. Here’s how to select a DLP system based on required functionality and its real-life ability to prevent data leaks.
Supply chain attacks show why you should be wary of third-party providers
The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
3 top enterprise file encryption programs compared
Any of these encryption apps can safeguard a file’s contents, but differ in terms of supported platforms, remote capabilities, and features.
Hashing explained: Why it's your best bet to protect stored passwords
Hashing is a cryptographic process that makes it harder for attackers to decrypt stored passwords, if used correctly.
The 15 biggest data breaches of the 21st century
Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.
Differential privacy: Pros and cons of enterprise use cases
Hiding sensitive data in a sea of noise might have more value than encryption in some use cases. Here are the most likely differential privacy applications and their trade-offs.
12 new state privacy and security laws explained: Is your business ready?
States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. Let's break down what each of these laws entails and how businesses and consumers are affected.
GLBA explained: What the Graham-Leach-Bailey Act means for privacy and IT security
The Graham-Leach-Bailey Act (GLBA) is a 1999 law that allowed financial services companies to offer both commercial and investment banking, something that had been banned since the Great Depression. It has an infosec reach that goes...
Top 4 security trends to watch for 2021
Bad news: Ransomware becomes a bigger threat, and it becomes harder to find security talent. Good news: CISOs gain clout, and security infrastructure will improve.
The Sarbanes-Oxley Act explained: Definition, purpose, and provisions
The Sarbanes-Oxley Act (sometimes referred to as SOA, Sarbox, or SOX) is a U.S. law passed in 2002 that aimed to protect investors by preventing fraudulent accounting and financial practices at publicly traded companies.
How secure are your AI and machine learning projects?
Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how experts minimized their risk.
8 types of phishing attacks and how to identify them
Phishing comes in many forms, from spear phishing, whaling and business-email compromise to clone phishing, vishing and snowshoeing. Here's how to recognize each type of phishing attack.
What is the dark web? How to access it and what you'll find
The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
9 types of malware and how to recognize them
Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit
21 best free security tools
Check out these free, standout software tools that will make your daily security work easier.
8 video chat apps compared: Which is best for security?
Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?
What is cryptography? How algorithms keep information secret and safe
Cryptography is the science of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.
-
White Paper
-
eBook
Sponsored -
White Paper
-
eBook
Sponsored -
Video/Webcast
Sponsored