Data Security
Data Security | News, how-tos, features, reviews, and videos
GLBA explained: What the Graham-Leach-Bailey Act means for privacy and IT security
The Graham-Leach-Bailey Act (GLBA) is a 1999 law that allowed financial services companies to offer both commercial and investment banking, something that had been banned since the Great Depression. It has an infosec reach that goes...
Top 4 security trends to watch for 2021
Bad news: Ransomware becomes a bigger threat, and it becomes harder to find security talent. Good news: CISOs gain clout, and security infrastructure will improve.
The Sarbanes-Oxley Act explained: Definition, purpose, and provisions
The Sarbanes-Oxley Act (sometimes referred to as SOA, Sarbox, or SOX) is a U.S. law passed in 2002 that aimed to protect investors by preventing fraudulent accounting and financial practices at publicly traded companies.
How secure are your AI and machine learning projects?
Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how experts minimized their risk.
8 types of phishing attacks and how to identify them
Phishing comes in many forms, from spear phishing, whaling and business-email compromise to clone phishing, vishing and snowshoeing. Here's how to recognize each type of phishing attack.
What is the dark web? How to access it and what you'll find
The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
9 types of malware and how to recognize them
Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit
21 best free security tools
Check out these free, standout software tools that will make your daily security work easier.
Supply chain attacks show why you should be wary of third-party providers
The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
The CISO’s newest responsibility: Building trust
Leading CISOs have already embraced the concept of trust as a deliverable and indeed are making it the central theme of their entire security function.
SAP ASE leaves sensitive credentials in installation logs
Two vulnerabilities in SAP ASE's Cockpit component leaves some sensitive information available to anyone on the network and other data susceptible to brute-force attacks.
IBM, Intel, AMD take different routes to hardware-based encryption
So-called confidential computing approaches allow data to remain encrypted while in use. That's best done in hardware, and IBM, AMD and Intel are following different paths, each with its own trade-offs.
11 penetration testing tools the pros use
Pentesting is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do.
15 signs you've been hacked—and how to fight back
Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been hacked.
Google Cloud steps up security and compliance for applications, government
New Google Cloud offerings Confidential VMs and Assured Workloads for Government provide in-process data encryption and the ability to restrict storage locations, respectively.
General Data Protection Regulation (GDPR): What you need to know to stay compliant
GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...
Protecting employee COVID-19 health data: What CISOs need to know
Most companies are tracking coronavirus-related health data of their employees, and this presents unique risks and security challenges for CISOs.
Install latest SAP Adaptive Server Enterprise patches, experts urge
If left unpatched, these SAP ASE vulnerabilities could give attackers full control of databases and servers.
-
White Paper
-
eBook
Sponsored -
White Paper
-
Video/Webcast
Sponsored -
White Paper