Data Loss Prevention

Data Loss Prevention | News, how-tos, features, reviews, and videos

blockchain links

Cybercriminals are using blockchain to improve security. Should you?

Business-minded hackers are testing blockchain technologies to secure their illegal operations. Here's what enterprises can learn from them.

binary rain / cloud / data / information / internet of things

Cloudy future for security analytics

Greater data volumes are driving an architectural change, forcing security analytics to the cloud.

blockchain in healthcare / doctor accesses one block in a chain of digital medical records

Can digital identity cure the chronically ill?

A secure, verifiable digital identity for patients would improve communication and information sharing across multiple specialists and caregivers.

phishing hacker binary keyboard privacy security breach

Facebook security and privacy issues revealed

Last week saw Facebook dealing with security and privacy issues, while the Port of San Diego got hit with a ransomware attack and researchers discovered two Linux kernel bugs.

smarthome security

The home analogy – security redefined for the hybrid world

What we can learn from our home security evolution in our cloud security journey.

Facebook / privacy / security / breach / wide-eyed fear

Facebook: 30 million accounts impacted by security flaw (updated)

On Friday, Facebook’s VP of product management Guy Rosen, coordinating with a Facebook post by founder Mark Zuckerberg, said the company discovered someone had abused access tokens for 50 million users on Tuesday afternoon.

Movie preview test pattern
Updated

Best security software: How 20 cutting-edge tools tackle today's threats

Lab tested reviews of the most innovative, useful and, arguably, best security software.

binary chains / linked data / security / blockchain

Form factor wars: Cloud-based or on-premises security technologies?

While most organizations are willing to consider cloud-based or on-premises security solutions, nearly one-third still demand the control associated with on-premises.

controling it costs

The potential costs of cybercrime that can’t be calculated

Cybersecurity risk often is treated as a nebulous, abstract concept. However, the possibility of attacks that start as cyber incidents but turn out to be a precursor to physical attacks are increasingly commanding more of our...

sony pictures movie

The Sony hacker indictment: 5 lessons for IT security

The recent indictment of North Korean hacker Park Jin Hyok contains valuable information from the FBI’s investigation that will help you defend against similar attacks.

FinTech abstract / virtual world of dollars, pounds, euros, bitcoins, etc.

Open banking is coming to the U.S.: How secure will it be?

To protect customer data, open banking regulations in the U.S. must have teeth and enforcement.

12 incident response life preserver survival disaster recovery

6 steps for building a robust incident response plan

While a lot of energy is put it into avoiding security breaches, it’s not always possible. A solid incident response plan can restrict damage, reduce recovery time and limit the associated costs.

teach train grunge abcs learn

5 cyber security basics you can't afford to ignore

Don't underestimate the impact of good cyber security housekeeping for preventing a successful attack.

flag of the united states department of state

State Department confirms breach of unclassified email system

The U.S. State Department confirmed it suffered a data breach of its unclassified email system. It says less than 1% of employees were affected.

login credential - user name, password - administrative controls

Review: Ping Identity brings identity management to cybersecurity defenses

Enterprise networks have grown too complex to easily manage all user credentials through something like Active Directory. And letting each individual app handle user logins creates silos that can become a security nightmare. The...

cybersecurity eye with binary face recognition abstract eye

Cybersecurity decisions that can’t be automated

Encourage those inside and outside your team to identify and challenge daily assumptions in order to adapt to change, think differently and make smarter, faster security related decisions.

shark risk dominate navigate lead danger

What is Wireshark? What this essential troubleshooting tool does and how to use it

Wireshark is a must-have (and free) network protocol analyzer for any security professional or systems administrator. It's like Jaws, only for packets.

security trust

5 steps to create a zero trust security model

A clear plan and willingness to change are critical to successfully moving to a zero trust environment.

flow of digital data through virtual data center servers

How identity layering improves data flow

The layered approach for security is dead. Long live layered digital identity and identity in depth.

cloud security ts

Enhancing cloud security for AWS deployments

As organizations continue to move their IT infrastructure to AWS or other cloud providers, addressing complex access control use cases with dynamic authorization is essential.

Load More