Data Security

Data Security | News, how-tos, features, reviews, and videos

Keep third-party risk on your radar: Piggybacked deer, giraffe and cat balance on a tightrope.
CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

COVID-19 coronavirus [morphology/visualization]

3 ways COVID-19 is changing CISO priorities

The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020.

Statue of Lliberty as a digital framework / New York / binary code

New York's SHIELD Act could change companies’ security practices nationwide

SHIELD Act provisions broaden the scope of consumer privacy and place requirement on protecting personal data for organizations that collect information on New York residents.

Dark net warning sign against black and yellow warning stripes in the background.

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

mobile security

8 mobile security threats you should take seriously in 2020

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these eight issues.

CSO > breakthrough / penetration testing / hammer breaking binary glass

11 penetration testing tools the pros use

Penetration testing is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do.

A circuit-board house.

The CCPA is an opportunity to get your data security house in order

As California’s privacy legislation goes into effect, it’s time to take stock of your security strategies around data and think about the future. The trend towards greater privacy is set to continue.

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

budget piggy bank spending savings security spending

Cybersecurity spending trends, 2020

Spending is up, but perhaps not in the most needed areas, increased business leader involvement brings new challenges, while vertical industries have different requirements and priorities.

Anonymous hooded figure consisting of an abstract binary matrix, amid glitched code.

8 steps to being (almost) completely anonymous online

The universe may believe in encryption, but it doesn't believe in anonymity. You're going to have to work for it.

cia triad security triangle glowing binary process by nolimit46 getty 2400x1600

The CIA triad: Definition, components and examples

The CIA (Confidentiality, Integrity, Availability) triad is a widely used information security model that can guide an organization's efforts and policies aimed at keeping its data secure.

data architecture

Data on the rise: 4 new challenges security must master

Data is information security's bread and butter, but the rise of data brings both new challenges and new opportunities. To meet them, security needs to change its relationship with data.

laptop / networked binary data flows / world map

Data breached in translation

Online language translation software caused a data leak at Statoil. Use these best practices to keep translated information secure.

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

Business ethics  >  Handshake extended in trust / reliability / transparency

The CISO’s newest responsibility: Building trust

Trust is becoming a differentiator in the marketplace, and CISOs who seek a more strategic role in their must engage the full range of stakeholders to build confidence that the organization has their best interests in mind.

First aid kit > help / fix / patch / remedy / recovery

8 ways your patch management policy is broken (and how to fix it)

These eight patching best practices mistakes get in the way of effective risk mitigation. Here's how to fix them.

Lock + key securing abstract data with a Windows logo overlay.

How to protect and safely erase data on Windows devices

Microsoft's BitLocker now uses AES encryption, but will default to the storage device's hardware encryption unless you make this setting, which will also allow you to easily sanitize drives.

Multifactor authentication  >  A mobile phone displays a digital key to a lock on a user's laptop.

5 trends shaking up multi-factor authentication

Universal adoption of multi-factor authentication (MFA) is hindered by technical limitations and user resistance, but its use is growing. Here's why.

Load More
You Might Also Like