Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

black man phone cafe upset
ransomware

1 intro insider threat

Sensitive data often follows former employees out the door

Almost 70 percent of employees take data on their way out. Here's how to stop it.

multifactor authentication

State-of-the-art multifactor authentication (MFA) technologies

Multifactor authentication offers more, better factors/options to protect credentials and data than ever.

owasp

Latest OWASP Top 10 looks at APIs, web apps

The new release of the OWASP Top 10 list is out from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs

threat ransomware response

Present and future ransomware tactics model the past

The way to understand, and avoid, becoming a victim of ransomware is to be prepared, said LEO Cyber Security CTO Andrew Hay. And part of that preparation is to understand its historical roots.

tunnel vortex

Cyber infrastructure: Too big to fail, and failing

Just about everybody – from enterprises to individuals – depend on cyber protection. They aren’t getting that much, according to the Atlantic Council’s Joshua Corman.

human weak link cybersecurity primary

Why you should worry about API security, but not panic

API developers offer some very striking responses to the question of how secure they believe their APIs are.

7 patch management practices guaranteed to help protect your data

With these fairly simple practices in mind, you can stay on top of patch updates and safeguard your virtual data environments

businesspeople passing notes in a meeting 78781404

Most employees willing to share sensitive information, survey says

According to an end user security survey released this morning, 72 percent of employees are willing to share confidential information. In the financial services sector, the percentage was even higher -- 81 percent said they should...

Family in silhouette waving goodbye at airport

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

binoculars desert

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

the word

Blockchain: 'Overhyped' buzzword or real-deal enterprise solution?

While blockchain technology may be a hotspot in data privacy, experts disagree about whether it’s a good fit for enterprises that have traditionally relied on centralized data control.

female worker server room data center

6 steps for setting up a server room for your small business

Are you worried about relying on a third-party online service provider to store your business data? Learn how to set up your own server room for an on-premises deployment instead.

1 app hacked

How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use

Man being crushed by large rock on top of laptop feeling stressed overworked

InfoSec pros feel less external pressure, take security more personally

Security professionals are feeling less pressure from management, less pressure to approve IT projects early, and are less worried about emerging technologies, according to a survey released this morning. But they are also putting...

11 insider threat

Detecting insider threats is easier than you think

Security experts weigh in on stopping the danger from your own employees. Access and security awareness training are the main themes to finding the danger that is within your own walls.

dragon statue head

Can AI and ML slay the healthcare ransomware dragon?

Healthcare is well known as “low-hanging fruit” for ransomware attacks. But according to some experts, artificial intelligence and machine learning, as part of a “layered” security program, can make them a much more difficult target.

medical records laptop doctor

How to securely deploy medical devices

Open Web Application Security Project (OWASP) has released a set of best practices for the secure deployment of those devices.

Load More