Data Security

Data Security | News, how-tos, features, reviews, and videos

supply chain
red padlock cybersecurity threat ransomeware

data security

Get serious about consumer data protection

With the CCPA coming hot on the heels of the GDPR it makes sense to get your consumer data management in order. Taking steps to protect all private data today will pay dividends tomorrow.

digital twins woman in profile ai mirror duplicate duo pair

Building relationships using digital identity

The how and why of building an identity platform based on reciprocal altruism.

gdpr

The unintended consequences of GDPR

This is not what the regulators had in mind. Business leaders, ignore at your own peril.

artificial intelligence ai blockchain digital learning chip

Machine learning: It’s all about the use cases [baby]!

With so much hype around “machine learning,” how can practitioners better understand which IT security applications can actually benefit? Experts suggest: forget the buzz – it’s the outcomes that are the most important.

security vulnerabilities in the IoT Internet of Things

Here I am, hack me

Bad actors are constantly trying to find ways to penetrate our networks. Recent attacks at LabCorp and the City of Atlanta demonstrate, however, that we are putting the welcome mat out for hackers by leaving key network ports open. ...

concentric rings of digital security with a lock at the center

Preparing for the day quantum computing cracks public-key cryptography: What to do now

Quantum computers could crack public-key encryption in as little as five years. Here's how to prepare for the post-quantum world.

man walking garage

Baby steps: building a cybersecurity strategy

Building a cyber strategy can be overwhelming unless you start with large goals broken down into smaller milestones.

monitoring systems

Data is the oil of the 21st century

The cybersecurity lessons of the 2016 election and the changing nature of our critical infrastructure.

speech bubble constructed from abstract letters

Cybersecurity acronyms businesses need to know

The cybersecurity market is becoming saturated with numerous acronyms representing technologies and concepts that may be alien to many. Here is a breakdown of some of the most common acronyms, how they relate to each other, and where...

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

Risks associated with third-party access

Security processes to implement when dealing with third-party access to your company’s network.

vintage voltmeter gauge

Small biz simplifies and moves the needle

Smaller orgs are working to fulfill mission-critical functions and are actually moving the security needle. Meanwhile, enterprises seem to get distracted by the bright shiny objects at the expense of establishing strong preventive...

03 cryptography

How to improve your crypto-agility

As the sheer number of connected devices continues to rise, securing these devices, and becoming “crypto agile” is a key component of an organization’s effort to become more agile. Read on to discover how to improve your...

mobile phone payment

What’s next in payment security?

The three fundamental changes that every card-accepting business and payment solution provider must know.

quantum

How quantum computers will destroy and (maybe) save cryptography

Quantum computers advance mean we might have only a few years before they can break all public key encryption. The day when every secret is known is near.

Dictionary definition of language under a magnifying lens.

The new definition for threat prediction

Security is hard enough without inaccurate understandings of your team setting unrealistic expectations for success. Security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings and...

CSO: Have you met these hackers? [slide 02]

Rough trade: Why financial markets will need to stay on top of their game

While election hacking is making headlines and Dan Coats is warning about 9/11 style cyberattacks on the US, it is our financial markets that may require the most immediate laser focus. The future preservation of our financial...

information security 2

Information security lessons from Theranos

An explosive new book Bad Blood: Secrets and Lies in a Silicon Valley Startup wasn’t written about security awareness, but it could have been.

heart monitor rate ekg hospital medical

How kidney stones help us think better about implementing security

Sometimes in life we go through very disruptive experiences that make us think about how we can better prepare ourselves. Kidney stones, while small, have that effect. The experiences you have with these can make you think about how...

Load More