Data Loss Prevention

Data Loss Prevention | News, how-tos, features, reviews, and videos

quell cyber attacks primary
computer forensics

Statue of Atlas against a blue sky and large white clouds.

Review: Protecting multi-cloud environments with Threat Stack

Because it's intended for use in environments that require constant uptime, Threat Stack simply concentrates on the detection aspect of cybersecurity, alerting admins when suspicious activity is spotted.

group of hackers in digital environment

Cylance researchers discover powerful new nation-state APT

A new APT, dubbed White Company, is flexing its muscle on the world stage, and it has security researchers worried.

hacker

Cyber criminals abuse US Postal Service Informed Delivery for ID theft

Criminals are abusing the US Postal Service's Informed Delivery for ID theft and fraud. Meanwhile, vulnerabilities were found in Oracle's VirtualBox, WordPress and Adobe ColdFusion servers.

cyber resilience shock absorber

Taking a moment to appreciate how far we’ve come

There is unprecedented responsibility on enterprises leaders and their security teams to create a culture of security and instill organizational cyber resilience.

android anti virus security

Best Android antivirus? The top 13 tools

There are plenty of antivirus tools for Android. Here's how the top 13 measure up in protection, usability and features.

cyber security lock padlock firewall code breach password

8 features a cybersecurity technology platform must have

Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements.

universal or multifunctional Swiss Army-like tool or toolkit to build, develop or repair

Top application security tools for 2019

Checking for security flaws in your applications is essential. These tools can help find and fix them.

Windows security and protection [Windows logo/locks]

Experience an RDP attack? It’s your fault, not Microsoft’s

Follow Microsoft's basic security guidelines for Remote Desktop Protocol and you'll shut down hackers who try to exploit it.

malware attack

Worst malware and threat actors of 2018 so far

Researchers name the worst malware and threat actors of 2018 so far, several vulnerabilities were disclosed, and HSBC Bank reveals it suffered a data breach.

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

07 vote

Republican Kemp accuses Georgia Democrats of hacking but provides no proof

Georgia’s Secretary of State Office is investigating the Democratic Party of Georgia for hacking the state’s voter registration system but failed to cite any evidence.

cyber attack virus meltdown

Meaner, more violent Stuxnet variant reportedly hits Iran

Iran admitted its “infrastructure and strategic networks” were hit by a meaner version of Stuxnet. Plus, Iran used Google to find CIA communication channels.

a clock half-submerged in water

Cyber security relics: 4 older technologies still plaguing the infosec world

Understanding the issues of the past can help us be better equipped to deal with seemingly new issues in the present.

stateofcybercrimethumb

State of cybercrime 2018: Security spending up, but so are the risks

IT and security management use more technology to defend against sophisticated hacker attacks, but still lag on security training.

Slacker guy with feet on desk

4 dangerous security assumptions to avoid

Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think. Unfortunately, this false sense of...

robot monitoringa  cog wheel system for maintenance [automation]

Automating security at AWS: How Amazon Web Services operates with no SOC

Amazon Web Services CISO Stephen Schmidt explains the company's recipe for combining security automation with ways to get management and staff to take security seriously.

10 cloud security breach virtualization wireless

Cybersecurity professional impressions on cloud-native security

Organization use cloud-native security controls, but they really want central management for cloud security across heterogeneous clouds.

1 network internet connected grid earth power satellite view

Thousands of critical energy and water systems exposed online for anyone to exploit

Critical functions such as starting or stopping a system can be accessed online by anyone, be it nation-state attackers or script kiddies.

Load More