Data Security

Data Security | News, how-tos, features, reviews, and videos

heart monitor rate ekg hospital medical

How kidney stones help us think better about implementing security

Sometimes in life we go through very disruptive experiences that make us think about how we can better prepare ourselves. Kidney stones, while small, have that effect. The experiences you have with these can make you think about how...

security risk - phishing / malware / social engineering

8 types of malware and how to recognize them

Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit

abstract image of business silhouettes in blurred motion

The best way to connect with a distracted and time-crunched security buyer

These four techniques will help you rise above the noise – warning some of it may be uncomfortable.

cybersecurity eye with binary face recognition abstract eye

Data science in service of detection vs. investigation

Cybersecurity firms often tout the use of data science, machine learning and artificial intelligence in their products. But there are consequential distinctions when you apply these techniques to specific cybersecurity use cases.

sacramento california state house

How citizen ownership of data impacts business going forward

Is California's Consumer Privacy Act of 2018 (CCPA) poised to become the new standard in the United States?

passwords

What is single sign-on? How SSO improves security and the user experience

Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

facial recognition - biometric security identification

DAM if you do and DAM if you don’t

How Digital Asset Management and identity management are perfect partners.

sad angry unhappy frustrated hands holding sign andre hunter 350301 unsplash

Lack of confidence in data security can cost you more than you think

The majority of companies don’t understand the value of their data, because they aren’t taking the necessary steps to study the information they are gathering from customers.

scary evil man with hood in the dark 100696889

HTML5: a devil in disguise

HTML5 is not the security safe haven it was once thought to be.

eye binary IDS Intrusion Detection System

Cybersecurity operations: Don't wait for the alert

An SOC is a useful part of our cybersecurity arsenal, but its main benefit will be in helping to minimize damage from an issue that has already happened. A strong investigative team, on the other hand, can help to identify and resolve...

switch from mac to pc apple logo

Apple insider attempts to take autonomous car secrets to China

Xiaolang Zhang, an Apple hardware engineer, harvested 40 gigs of data about the Apple Car and took a server and circuit boards prior to announcing his intent to join XMotors and return to China.

wave2 wi fi access points 1

Staying secure as the IoT tsunami hits

The ubiquitous adoption of devices in virtually every industry is creating a massive, global security gap. Data science can help reign in the risks.

blockchain links

How are small businesses adopting blockchain technology?

How and why small businesses are taking advantage of blockchain technology to improve their business models – from their cloud storage to their payment methods.

facial recognition access identification biotech

Strength in knowledge: How connected identity and access management transforms secure access

Connecting systems and sharing intelligence are key to fighting cybercrime—because even the most robust identity and access management solution can’t do it alone.

binary code

The quantum computing cyber storm is coming

What cyber leaders need to know now to protect their critical data in the quantum era.

gdpr

GDPR: Where are we now?

GDPR became the law of the land in Europe on May 25th. The impact has been felt across the globe...

steal theft hacker crime laptop firewall

Sinovel Wind Group found guilty of IP theft, fined $1.5 million

While American Superconductor's data logs and stores were helpful in convicting Sinovel Wind Group of IP theft, a data loss prevention strategy could have identified the thieves' activities sooner.

5 fumbling dumb mistake

The ostrich security strategy is now very risky

Ignorance of a serious security event is unreasonable, and just like ignorance of the law, it is no defense.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

Security versus usability a conundrum in modern identity management?

Convenience and usability vs. security when dealing with a valuable verified identity.

file folder storage and sharing

How cloud storage solutions are evolving to fight hackers

Decentralized cloud services are disrupting the industry, increasing security and more. Here's how these companies are looking to the future and designing a new breed of storage solutions: decentralized, blockchain-backed cloud...

Load More