Data Loss Prevention

Data Loss Prevention | News, how-tos, features, reviews, and videos

online shopping cart magecart hackers shopping online

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.

FireMon network security policy management
Updated

Security software reviews, 2019: Lab tests of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market.

secured vpn tunnel

What is WireGuard? Secure, simple VPN still in development

The WireGuard VPN offers better performance and a simpler, effective approach to cryptography. Is it ready for the enterprise?

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.45 billion and counting.

data / analytics / trends

5 security operations and analytics trends to watch in 2020

Look for more integration, an increasing focus on risk management, and greater use of the public cloud.

smart city - Industry 4.0 - industrial IoT internet of things - mobile wireless network

Hackers use free tools in new APT campaign against industrial sector firms

Attackers seek to make attribution harder and use sophisticated, realistic spear-phishing emails.

artificial intelligence / machine learning / binary code / virtual brain

Who will harness AI more effectively in the new decade: cybercriminals or cybersecurity professionals?

The intersection of AI and cybersecurity will loom large not only for security practitioners but for the well-being of society.

capture the flag hackathon face off

"Penn Test" challenge helps infosec team think like attackers

At Penn Medicine, gamifying security training builds skills, drives employee retention.

Bingo balls read 19, 20 and 21; no. 20 at the forefront.

2020 cybersecurity trends: 9 threats to watch

Here's how your biggest threats of 2019 will likely trend for 2020 and how you might change your defensive strategy for them.

career roadmap primary

What it takes to become a CISO

The chief information security officer (CISO) role has been steadily rising in importance and visibility. CISOs now carry the burden of responsibility for securing some of a company’s most valuable resources.

Vintage voltmeter gauge / binary code

Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

By manipulating the voltage of Intel CPUs that use SGX, researchers can extract sensitive data, including full RSA encryption keys, from memory using the Plundervolt vulnerability.

rear view mirror with desert scene in the distance

2019 in review: data breaches, GDPR’s teeth, malicious apps, malvertising and more

As 2019 draws to a close, it is time to reflect on what’s happened in cybersecurity over the past twelve months – and in some cases, what didn’t happen this year.

tools / toolkit / binary code

9 top fuzzing tools: Finding the weirdest application errors

Fuzz testing tools root out odd programming errors that might result in dangerous unexpected application errors that attackers can exploit.

cloud security lock

3 cloud security ‘hacks’ to consider today

Keeping your cloud deployments secure is a full-time job. Here are a few shortcuts that make your cloud security better and your life easier

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

8 common pen testing mistakes and how to avoid them

Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them.

silver platter passwords exposed authentication hacked vulnerable security breach

4 authentication use cases: Which protocol to use?

Choosing the wrong authentication protocol could undermine security and limit future expansion. These are the recommended protocols for common use cases.

Tortoise-defense formation of the Spartans  >  warfare / war games / red team binary target / attack

Why BT's red team strikes for real

UK-based BT's red team conducts attacks on live systems without informing the rest of the business or the blue team defending it. BT Group CSO Les Anderson says this is key to the company's proactive approach to security.

CrowdStrike logo / Ukraine flag and map on globe / data center servers / binary code

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

Politicizing cybersecurity only serves to undermine trust in its practices and objectivity, experts fear.

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

How to evaluate a CASB

All cloud access security brokers share core functionality, but they deliver it differently and they all have unique feature sets. Here's what you need to know before buying one.

access management / access control / user connections / identities

Flex streamlines app access for 20k suppliers with IAM overhaul

Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property.

Load More
You Might Also Like