Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

ransomware key 500 1
1 iot intro

emv chip and pin

Chip card payment confusion, anger rages on

Six months after U.S. retailers began assuming liability for debit and credit card fraud, only a fraction of the nation's in-store payment terminals can accept the highly secure chip-enabled cards.

blockchain code

What is blockchain and how does it work?

Bitcoin exploded on to the world’s stage in 2012 as a currency backed by everyone and controlled by no one. But what exactly makes it work from a technology standpoint?

spin torque MRAM

Everspin ships high-density MRAM to safeguard data in flight

Everspin is shipping 256Mbit and 1Gbit MRAM chips to commercial customers, which will allow hot data on servers to be stored safely even in a power failure.

identity management

Survey: Investment in identity management is booming

IT spending may be in a slump, but investment in identity management continues apace, according to a new survey.

snowden protest

Did NSA underestimate the insider threat?

In this edition of the Irari Report, Ira Winkler and Araceli Treu Gomes continue their interview of Chris Inglis, former Deputy Director of NSA. In this segment, they focus on how an organization that is so aware of the insider threat...

CSO Identity Management Survival Guide cover image

The CSO identity management survival guide

Research firm Gartner says identity management is "a crucial undertaking for any enterprise." This guide will you communicate through the challenges, learn from success stories, and dive into the most valuable features of today's...

Cargo shipping containers stacked on dock at night

New sensors help reduce supply chain risks

Better sensors help companies reduce shipping risks and react faster to disruptions, but costs and deployment challenges are still slowing adoption

dark buildings

Chief Risk Officers needed to battle rising corporate espionage

A growing number of organizations are adding a new member to the C-suite—the chief risk officer (CRO)—and the rise of these executives is having a direct impact on the security programs at enterprises.

us turkey

Political statements largely behind DDoS attacks

The Q1 report from Nexusguard found that Hurricane was the top DDoS source used, and attacks were most frequently launched on Tuesdays. The recent results of Nexusguard's Q1 2016 research show that attackers have reverted back to...

global network of employees

Only a third of companies know how many vendors access their systems

The average company's network is accessed by 89 different vendors every week, according to a new research report that surveyed more than 600 IT decision makers at mid-sized and large enterprises -- but only a third were confident...

EU flag

GDPR explained: What you need to know about the EU's data protection rules

What the regulation says, what it means for you, and how to achieve compliance.

hard drive stock

Millions of child support records stolen, D.C. officials want answers

Two people have been arrested, but stolen drives with millions of child-support records are still missing in Olympia, Washington. The hard drives belonged to the local office of the Administration for Children and Families, part of...

financial data ts

Boston Fed official: The financial industry is not bulletproof from threats

At the Boston Fed’s 2016 Cybersecurity Conference, the overall message was that security in the financial sector is good, but needs to keep getting better, faster.

hospital patient maternity

Hospitals hacks put patient health at risk

A report that highlights the vulnerabilities in medical devices and the risks they pose to patient health issued by Independent Security Evaluators comes at an opportune time as the past month has shown that hospitals are becoming...

portrait of an embarrassed man peeking from behind his hand dv1912060

Don’t let embarrassment about a data breach cost you even more

Cyberthieves prey on human nature for even more profit.

head sand oblivious denial

Denial Syndrome: Consumers don’t think they’ll get hacked

Multiple surveys find that when it comes to online consumer security and privacy, there is a disconnect: Users say they care about it, but most of them don’t make any effort to do much about it. Some experts say government and...

01 intro

Ever been in these social engineering situations?

A security consultant lays out various scenarios in hopes you are not the next victim.

blockchain code

Is the blockchain good for security?

The blockchain is now being hyped as the solution to all inefficient information processing systems, such as recording of property transfers, escrow services, and even legal contracts, but there are both security benefits and...

Load More