Data Security

Data Security | News, how-tos, features, reviews, and videos

a hooded figure targets a coding vulnerability
1 darkweb marketplace

mobile apps

Data Privacy Day 2019

GDPR was just the beginning. It started in the EU, but it’s waking up the world on just how much our privacy is being violated.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

Take time to think about security amidst the greatest gadget show on the planet – CES

Let us put our thinking caps back and ask the right questions.

big data messaging system / information architecture / mosaic infrastructure

Big data: too valuable and too challenging to be overlooked

The positive potential of big data is enormous, spanning virtually all industries and impacting both the public and private sectors. However, we must also be mindful of safeguarding big data as much as collecting and utilizing it.

Facebook / privacy / security / breach / wide-eyed fear

How Facebook's privacy woes might change the rules of the road in 2019

Following a string of data privacy and protection missteps, Facebook faces potential backlash from legislators and consumers that could affect all companies that process consumer data.

new job roles

5 steps to simple role-based access control (RBAC)

RBAC is the idea of assigning system access to users based on their role in an organization. It's important to remember that not every employee needs a starring role.

solidary individual walks alone through a tunnel of light

Real life, why people escape it – and bringing them back

Security isn’t just about technology - that's only 10% of the total solution. Most of what we try and do is build awareness and communication between our team members and the rest of the company. And that requires being active social...

The 18 biggest data breaches of the 21st century

Security practitioners weigh in on the 18 worst data breaches in recent memory.

nest cam iq review on shelf

Our homes are not the impenetrable fortresses they once were

Today’s homes are loaded with connected devices. However, security practitioners are still trying to catch up with the growth of smart devices.

network security hacker virus crime

A look back at cybercrime in 2018

Prepare now to mitigate the most cyber risk in 2019!

4 .root cause exploits breach raining data binary psd

Has the word ‘breach’ has outlived its usefulness?

When someone says a data breach has happened, it’s generally understood to mean that attackers have broken into a company and stolen sensitive information. But after a growing number of high-profile privacy gaffes, the definition of...

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS protection, mitigation and defense: 8 essential tips

Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.

danger lurking in mobile binary code

Why hacking leads to less security respect

If security and risk management continue to be marketed as tools that aren't necessarily complementary to an organization’s strategy, they will continue to be seen as outsiders.

red number 7 on white wall top seven

7 security trends to watch in 2019: More AI, consolidation and regionalization

It’s that time of year again, when we look back to look ahead. The 2019 security landscape holds new promise, threats, developments and opportunities to collectively tackle the issues our industry faces.

Mobile security

6 mobile security threats you should take seriously in 2019

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these issues in the coming year.

5 small business security

Small Business Saturday means it’s time for an annual cyber refresh

5 steps that SMBs should take to review and refresh their security policies and procedures.

quell cyber attacks primary

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

The cyber kill chain breaks down each stage of a malware attack where you can identify and stop it, but be aware of how attack strategies are changing.

square peg round hole no fitting bad idea

The end of security as we know it

Beware of vendors who attempt to abdicate their responsibility to unnamed third-party contractors.

cyber resilience shock absorber

Taking a moment to appreciate how far we’ve come

There is unprecedented responsibility on enterprises leaders and their security teams to create a culture of security and instill organizational cyber resilience.

Load More