Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

3 bitcoin
How You Will Get Hacked Next

Man looking worn out in mod orange chair with a wad of cash in a mouse trap

Users take the cheese to solve data breaches

Verizon releases its annual breach report that puts the reader in the driver's seat.

smartphone shocked group

The high price of security shaming [Infographic]

Two-thirds of IT security professionals said they would pay an average of $124,000 to avoid public scandals associated with security breaches.

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage.

wallet man money

To pay or not to pay: Too many victims say yes to ransomware

Ransomware’s success rate is so alarming that it is the subject of an all-day “summit” at this week’s RSA conference. Ironically, experts say defending against it is not terribly difficult, and how to do it is widely publicized – it’s...

glowing box

Rise of as-a-service lowers bar for cybercriminals

Widespread availability of RaaS and botnet rentals for DDoS attacks make it easy for those without technical skills to enter into cyber crime

2 not sick

Your personal info might be as sick as you

Moshe Ben-Simon, co-founder and vice president of TrapX Security, runs through how hospitals can shore up your data so that cybercriminals can’t get at it.

bullseye hospital healhcare

Hospital devices left vulnerable, leave patients at risk

A patient lies in a hospital bed waiting for a medical professional to conduct a blood gas analysis. Little does the patient know that his personal information is also undergoing a procedure. The database that stores patient data was...

cso50 intro

CSO50 2017: 50 forward-thinking security projects

The annual CSO50 conference in May will showcase cutting-edge technologies.

cso50 intro

CSO50 2017: A step ahead of the threats

The CSO50 awards honor innovative security projects that demonstrate thought leadership and outstanding business value.

01 challenges

What cyberinsurance gotchas companies must be ready for

CipherLoc Vice President Mike Salas details six challenges companies will face as the insurance industry begins to expand its presence in the cybersecurity industry.

credit cards keyboard

The 2017 state of strategic digital banking

Banks are struggling to survive through the digital age. In order to compete with FinTechs, regulatory mandates and consumer requirements, banks must be able to plug-and-play into the digital business ecosystem to recover market share...

clock and calendar montage

January 2017: The month in hacks and breaches

Hackers are off to a quick start in the new year.

data visualization heads users walking

Data realities of 2017 and beyond

There’s no escaping the facts anymore: Data rules everything now. Are IT leaders prepared to deal with that?

co workers

Why the 'smart' employee trend should worry us

Smart wearable technology continues to pervade every aspect of life, giving new opportunities, and dangers, for employers to abuse their workers.

controlling privacy

5 shocking new threats to your personal data

The internet and smartphones have come up with five new and surprising ways to steal or expose our personal data. These trends make panic sound like a good idea.

cyber warfare war

How AI is stopping criminal hacking in real time

Almost every day, there’s news about a massive data leak -- a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around,...

hacker hacked security risk

Why 2017 will be the worst year ever for security

High-profile breaches are just the tip of the iceberg. Many have never been detected or disclosed--and without a major infrastructure changes it's only going to get worse

11 phish

Phishing test results in a barely-passing grade for users

Diligent recently surveyed 2,000 people to see who got caught hook, line and sinker for the phishing scam.

Load More