Data Security

Data Security | News, how-tos, features, reviews, and videos

learn basics of ethical hacking

What is ethical hacking? How to get paid to break into computers

Ethical hacking is legally breaking into computers and devices to test an organization's defenses. Here’s what ethical hacking entails and the certifications and training you need to become an ethical hacker.

Mobile security

7 mobile security threats you should take seriously in 2019

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these seven issues this year.

gated community open source closed lockin

Combatting drama and barriers in the infosec community

At its onset, the infosec community was very inclusive and welcoming…when others were not. Over the years, we’ve forgotten where we came from and why. Self-appointed gatekeepers leaders of who belongs in the community (or not) have...

poaching talent fishing lures bait catch recruit

6 ways to equip your phishing tackle box

Like many of the threats in cybersecurity, using a comprehensive and business-driven approach to reveal risk can help you focus your efforts on what matters most.

security threats and vulnerabilities

What is an advanced persistent threat (APT)? And 5 signs you've been hit with one

An advanced persistent threat (APT) is a cyberattack executed by criminals or nation-states with the intent to steal data or surveil systems over an extended time period. Here's how to know if you've been hit with one.

network iot world map us globe nodes global

Cybersecurity: A global threat that we can control

Protecting data and thwarting cyberattacks now have ascended alongside dealing with natural catastrophes as the most pressing threats demanding the world’s full attention.

data security

451 Research: Security is top data management challenge

A survey of highly qualified data management professionals by 451 Research shows that growing data volumes have made security their biggest concern.

data security encryption

Can owning your company’s encryption lead to better security?

While the current vendor environment clearly poses significant challenges and risks to businesses entrusting them with their data, use of encryption can, at least in many cases, materially mitigate that risk. The devil, however, is in...

01 intro prediction

10 cybersecurity trends to watch for 2019

In the early days of 2019, cybersecurity is as challenging as ever. We highlight some of the biggest cybersecurity trends that are set to impact the enterprise, security professionals and companies of all sizes in the year ahead.

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

patching against ransomware

The three most important ways to defend against security threats

Patching, security training programs and password management will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.

1 volume of data breach pile of paper confidential documents

The politics of ‘Have I Been Pwned’

Data breaches are not created equal. Business leaders and security managers must beware the dangers of FUD and hype created around notification of old breaches.

a hooded figure targets a coding vulnerability

Breaches, market volatility and the government shutdown: Security in the crosshairs

If the start of 2019 is anything to base the year ahead on—with data breaches, shakiness in the market and the government shutdown negotiations at an impasse—cybersecurity experts are going to have their hands full with increasingly...

1 darkweb marketplace

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

mobile apps

Data Privacy Day 2019

GDPR was just the beginning. It started in the EU, but it’s waking up the world on just how much our privacy is being violated.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

Take time to think about security amidst the greatest gadget show on the planet – CES

Let us put our thinking caps back and ask the right questions.

big data messaging system / information architecture / mosaic infrastructure

Big data: too valuable and too challenging to be overlooked

The positive potential of big data is enormous, spanning virtually all industries and impacting both the public and private sectors. However, we must also be mindful of safeguarding big data as much as collecting and utilizing it.

Facebook / privacy / security / breach / wide-eyed fear

How Facebook's privacy woes might change the rules of the road in 2019

Following a string of data privacy and protection missteps, Facebook faces potential backlash from legislators and consumers that could affect all companies that process consumer data.

new job roles

5 steps to simple role-based access control (RBAC)

RBAC is the idea of assigning system access to users based on their role in an organization. It's important to remember that not every employee needs a starring role.

solidary individual walks alone through a tunnel of light

Real life, why people escape it – and bringing them back

Security isn’t just about technology - that's only 10% of the total solution. Most of what we try and do is build awareness and communication between our team members and the rest of the company. And that requires being active social...

Load More
You Might Also Like