Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

cybersecurity
81p5l6fqewl. sl1500

hidden door

How to respond to device and software backdoors inserted or left by vendors

CSO looks at vendor backdoors, how they get into products, the challenges to finding these, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma.

2 ransomware

If you think ransomware is a user failure, you’re a failure

It is easy to blame users for causing ransomware infections of their own systems. However, the reality is that for the user to infect their system, there are many technical failures, which are due to the IT staff’s actions or lack...

06 bank accounts atm

How to protect yourself from ATM crime

Banks like Wells Fargo are rolling out much better ATM security. Here's why it won't stop ATM theft.

1 intro insider threat

How to stop insider threats

There are a number of things that decision makers can do to protect their companies and minimize, if not eliminate, the threat of employee theft of sensitive and confidential information.

1 threat intro

These 10 people may be your greatest inside security risks

Last year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access.

bug bounty

How much is a bug worth?

With recent increases in bug bounty amounts in the news, Bugcrowd shows how a bug bounty amount is calculated.

01 plan

Do you have an incident response plan in place?

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored.

magnifying glass contract

Want good cyber insurance? Read the fine print

Given the explosive growth of online threats, cyber insurance is becoming mandatory for most organizations. But the field is still new enough that buying an effective policy takes a lot of due diligence and attention to the fine print....

handcuff arrest

Hire a DDoS service to take down your enemies

With the rampant availability of IoT devices, cybercriminals offer denial of service attacks to take advantage of password problems.

continuous authentication

Continuous authentication: Why it’s getting attention and what you need to know

In some cases traditional authentication processes are not enough to provide strong security throughout a user work session. That’s where continuous authentication comes in.

0 intro

7 tips for developing a powerful data disaster plan

Commvault has provided the following tips that will help enterprises develop simple yet powerful holistic data protection plans that enable enterprises to quickly recovery the data they need if there is a data disaster, in an...

phone picture conference

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

diy robot

Bots: Biggest player on the cybercrime block

Bot fraud cost an estimated $31 billion in the US last year, dwarfing the estimated $1 billion lost to ransomware and DDoS attacks.

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

james comey fbi cyberconference

Comey: Strong encryption “shatters” privacy-security bargain

FBI director James Comey told a cybersecurity conference that “absolute privacy” has never been part of the nation’s privacy-security bargain. Ubiquitous strong encryption, he said, “shatters that bargain.”

cia cyber

If the CIA can sidestep encryption, what makes you think cyberthieves can’t?

New Wikileaks documents show agents simply refining standard techniques of cybercriminals.

accusation

What's the value in attack attribution?

Does attack attribution and knowing your adversaries really matter when it comes to securing the enterprise?

Big data

Recharge your knowledge of the modern data warehouse

Data warehousing is evolving from centralized repositories to logical data warehouses leveraging data virtualization and distributed processing. Make sure you’re not using old terminology to explain new initiatives.

Load More