Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

01 intro
Digital Key, security, encryption

stormy seas

U.S. and EU tech companies at sea with end of data Safe Harbor

New EU regimes are under consideration, but currently uncertainty reigns.

block chain

Blockchain: You’ve got questions; we’ve got answers

Everything you need to know about an overhyped, but promising technology.

01 plan

9 steps for a successful incident response plan

It is of vital importance to have a plan in place before an incident hits your company.

Digital Key, security, encryption

Researchers release free decryption tools for PowerWare and Bart ransomware

Security researchers have released tools this week that could help users recover files encrypted by two relatively new ransomware threats: Bart and PowerWare.

f secure ransomeware

Why ransomware criminals need great customer service

Yes, even bad-guy malware developers have to keep their "customers" happy. Read what happens when F-Secure tests the "help desks" of four crypto-locking malware makers.

old books

How to improve your incident response plan

A well-formed, and well-tested, incident response can determine how well an organization responds to a data breach. CSO Online looks at how you can improve your own incident response plan so to reduce the impact of that data breach.

Start up your privacy awareness program: posters

Every comprehensive privacy program includes a formal training component. In person classes, computer-based training and webinars are some of the ways to fill this need. Formal privacy training most often occurs once a year. However,...

wearables workers

Wearables could compromise corporate data

Smartwatches, fitness trackers and other wearable devices that are connected to corporate Wi-Fi networks could lead to serious privacy and security issues, experts say.

Digital Key, security, encryption

New Locky ransomware version can operate in offline mode

The creators of the widespread Locky ransomware have added a fallback mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers.

republican national convention

Big Data and elections: The candidates know you – better than you know them

Security experts have been saying that ‘privacy is dead’ for a long time. The collection of voter data by modern political campaigns is another stark example.

video

Security Sessions: Protecting data at the endpoint

In this episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Brett Hansen, executive director of Data Security Solutions at Dell, about keeping data safe in an increasingly mobile world.

01 intro detection

How to become an offensive-minded company

10 ways to shift your company’s cybersecurity approach from a focus on prevention to detection.

Threat hunting guide to securing the enterprise

The threat hunter's guide to securing the enterprise

You're already breached. Here's how to track down attackers on your network before they wreak havoc.

pasword grave

Killing the password: FIDO says long journey will be worth it

The FIDO Alliance, formed just four years ago to find a better way than passwords for online authentication, is promoting a standard that keeps user credentials only on the user device. An attacker would have to steal your device to...

1 superhighway

6 high-tech ways thieves can steal connected cars

Your car provides you with more than just transportation. And criminals want at that information.

stack of money hundred dollar bills

Why you shouldn't pay the ransomware fee

While most of the decision makers would likely prefer to hear a simple yes or no when asking if they should pay, nothing in security is simple. By and large, the position of many leaders in the industry is that the ideal situation is...

hardware security embedded circuit board integrated controller

Cybersecurity firms step up intel sharing despite issues of trust

The war against the cyber criminals won’t be won alone. To keep the hackers at bay, more security vendors have been trying to foster cooperation, and share data on the latest threats – even as it might spark concerns over trust and...

rockets warplane

The enterprise is in an arm's race with cybercriminals

CSO explores the deep web, dwell time, and their roles in the balance of power in cybersecurity, pointing up defensive moves such as employing hackers and improving the effectiveness of employee education about social engineering /...

Load More