Data Loss Prevention

Data Loss Prevention | News, how-tos, features, reviews, and videos

Microsoft Windows security  >  Windows laptop + logo with binary lock and key
Data breach  >  open padlock allowing illicit streaming data collection

QR code on mobile phone [CC0 image by Gerd Altmann via Pexels]

How attackers exploit QR codes and how to mitigate the risk

Attackers are taking advantage of the increased use of QR codes to steal sensitive information or conduct phishing campaigns. Here's what security teams and employees need to know.

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Egregious 11," the top security threats organizations face when using cloud services.

5 cryptography and data protection

What is cryptography? How algorithms keep information secret and safe

Cryptography is the science of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.

Ransomware  >  A masked criminal ransoms data for payment.

Financial crime group FIN11 pivots to ransomware and stolen data extortion

FIN11, believed to be Russia-based, follows a trend of cybercriminal groups expanding their operations beyond financial crime.

CSO > Azure automation for Let's Encrypt certificates

Azure Security Benchmark v2: What you need to know

Here's what Microsoft's new security benchmarks include and how they can help you better understand your Azure security posture.

One lock in a series is unlocked / weakness / vulnerability

Half of all virtual appliances have outdated software and serious vulnerabilities

New study shows that even security vendors can use outdated and vulnerable virtual appliances. Top advice: Make sure your vulnerability management processes include virtual appliances.

A man casts the shadow of an ominous hooded figure against a circuit-based wall.

Elusive hacker-for-hire group Bahamut linked to historical attack campaigns

The Bahamut group targets high-value victims and takes meticulous care with its own operational security.

internet web browser https / url address bar

Silo for Safe Access: A more secure web browser for some use cases

Authentic8's Silo is a sandboxed web browser designed to protect users and systems from malicious code. It can be a more secure option than VPNs or virtual desktops in some cases.

RIP - grave - tombstone - cemetery - death [Image by Rob van der Meijden - CC0 via Pixabay]

Preparing for Flash and Office 2010 end-of-life

The imminent end of Microsoft's support for Adobe Flash is a good excuse to see what other end-of-life applications running on your Windows network could leave you vulnerable.

android trojan banking hack virus bank breach by etienne martin unsplash and google android

Alien malware a rising threat to mobile banking users

The Alien malware has quickly become a popular choice for cybercriminals to commit bank fraud. Here's why.

A computer with an abstract security system overlay.

Five ways to keep working from home safe for your employees and your company

For many of us, we're not going back to working from the office anytime soon, so it's time to give serious thought about securing our home offices.

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.63 billion and counting.

conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2020

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

forensics threat hunter cyber security thumbprint

Tips to prep for digital forensics on Windows networks

Know what data you need to collect and how you will collect it before a security incident occurs on your Windows network.

Unlocked circuit board / security threat

6 top vulnerability management tools and how they help prioritize threats

Organizations handle vulnerability management in various ways, from training and best-practice implementations to filtering out all but the most dangerous threats. Here's a look at some of today's more innovative solutions.

Impersonation / disguise / fraud / false identity / identity theft

Identity theft explained: Why businesses make tempting targets

Identity theft is the use of someone else's personal information without permission, typically to conduct financial transactions. Here's what you need to know to protect yourself and your organization.

Insider threats  >  Employees suspiciously peering over cubicle walls

Preventing insider threats: What to watch (and watch out) for

Understanding human behaviors that precede malicious actions from an insider is the best way to avoid data loss or disruption, experts say.

bucket with holes breach security vulnerability

SAP ASE leaves sensitive credentials in installation logs

Two vulnerabilities in SAP ASE's Cockpit component leaves some sensitive information available to anyone on the network and other data susceptible to brute-force attacks.

Load More
You Might Also Like