Data Security

Data Security | News, how-tos, features, reviews, and videos

nest cam iq review on shelf
network security hacker virus crime

4 .root cause exploits breach raining data binary psd

Has the word ‘breach’ has outlived its usefulness?

When someone says a data breach has happened, it’s generally understood to mean that attackers have broken into a company and stolen sensitive information. But after a growing number of high-profile privacy gaffes, the definition of...

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS protection, mitigation and defense: 8 essential tips

Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.

danger lurking in mobile binary code

Why hacking leads to less security respect

If security and risk management continue to be marketed as tools that aren't necessarily complementary to an organization’s strategy, they will continue to be seen as outsiders.

red number 7 on white wall top seven

7 security trends to watch in 2019: More AI, consolidation and regionalization

It’s that time of year again, when we look back to look ahead. The 2019 security landscape holds new promise, threats, developments and opportunities to collectively tackle the issues our industry faces.

Mobile security

6 mobile security threats you should take seriously in 2019

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these issues in the coming year.

5 small business security

Small Business Saturday means it’s time for an annual cyber refresh

5 steps that SMBs should take to review and refresh their security policies and procedures.

quell cyber attacks primary

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

The cyber kill chain breaks down each stage of a malware attack where you can identify and stop it, but be aware of how attack strategies are changing.

square peg round hole no fitting bad idea

The end of security as we know it

Beware of vendors who attempt to abdicate their responsibility to unnamed third-party contractors.

cyber resilience shock absorber

Taking a moment to appreciate how far we’ve come

There is unprecedented responsibility on enterprises leaders and their security teams to create a culture of security and instill organizational cyber resilience.

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Abstract numbers for stock exchange

Data exchanges know all about you; soon they'll impact cybersecurity

Our digital lives, physical locations and credit card usage are traded on exchanges. If there’s such a thing as “surveillance capitalism,” data exchanges are the closest thing to three letter intelligence agencies.

Slacker guy with feet on desk

4 dangerous security assumptions to avoid

Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think. Unfortunately, this false sense of...

robot monitoringa  cog wheel system for maintenance [automation]

Automating security at AWS: How Amazon Web Services operates with no SOC

Amazon Web Services CISO Stephen Schmidt explains the company's recipe for combining security automation with ways to get management and staff to take security seriously.

cloud security

3 top multi-cloud security challenges, and how to build a strategy

A number of security best practices have emerged alongside the growth of the multi-cloud environment, security experts say, and there are several critical steps that all organizations should take as they develop their own security...

money case ransom hundreds

7 best practices for negotiating ransomware payments

Sometimes companies are forced to meet cyber criminals’ ransom or extortion demands. This advice will give you your best chance to get your data back and preserve your reputation.

1 tsunami

The IoT tsunami is coming

The Internet of Things will change everything, in all sectors...and you'd better have a plan.

hand gestures / gesturing / talking / communicating / conversation

Communicate or die: Tech leaders who bring information security to life

3 engaging technology leaders, what makes them effective communicators and their tips for effective AI/cyber communication.

monitoring systems

Will your company be valued by its price-to-data ratio?

The job of every security professional is to protect their organization’s price-to-data ratio. In the past, it was typically the Sales and Marketing teams in the hot seat driving a company’s valuation by maintaining sales goals to...

Load More