Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

fiber internet ethernet cord networking
ecryption opener

robot keyboard

China vs. the machine (learning)

The highly publicized agreement last fall between the U.S. and China to end economic espionage has had little effect. Experts say that it is up to companies to protect themselves, and that tools like machine learning can help.

eu flag privacy

EU, U.S. data-transfer deal will never work

And there’s no way the negotiators didn’t know that.

flashlight barn farmer

Decrypt SSL traffic to detect hidden threats

As more enterprises increase the amount of SSL traffic, more criminals are able to hide.

victim of identity theft

Identity theft victim? This site helps you reclaim your life

A revamped government website will offer consumers personalized, step-by-step guidance to reclaim their identities and untangle compromised accounts.

Court of Justice of the European Union

No agreement as deadline to replace Safe Harbor nears

No replacement has yet been found for the transatlantic data-transfer agreement overturned last year by the European Union's top court, just days away from the deadline EU data protection authorities gave negotiators to come up with a...

antivirus stock image

27% of all malware variants in history were created in 2015

Last year was a record year for malware, according to a report from Panda Security, with more than 84 million new malware samples collected over the course of the year

destroyed hard drive

Data destruction 101: There's more to it than wiping your drive [Infographic]

What you need to know about preparing hard drives for reuse, recycling, and disposal.

04 passwords

Passwords continue to be a security problem

CISOs say advanced authentication methods must be used in tandem with traditional passwords.

doctor tablet medical

Why any organization can suffer a healthcare breach, and 5 tips for keeping PHI safe

Industry professionals say that companies should identify where PHI data is hiding in their organization and take steps to lock it down.

Hot seat

Planning for security breaches: What CIOs need to know to stay out of the hot seat

The C-suite is on the hot seat for security as companies face lawsuits stemming from security breaches, says Matthew Karlyn, Partner, Technology Transactions & Outsourcing Practice, Foley & Lardner LLP. Listen to Karlyn's CIO...

Tic tac toe

Shall we play a game?

You cannot win the game of restricting end-user IT against business people with credit cards and expense accounts. The only winning move is not to play.

compliance2

Cybersecurity much more than a compliance exercise

An overwhelming number of security executives view compliance as an effective strategy. But it’s not, and many CISOs need to rethink their priorities.

data privacy ts

Feds seek balance between privacy and data collection

Federal consumer-protection authorities expect companies to do more to educate consumers and offer options to limit how personal data is collected and used.

Board Room

What the board needs to know about cybersecurity compliance

Board members are now facing lawsuits after large-scale cybersecurity breaches because the security breakdowns are considered a failure to uphold fiduciary duties.

shrug

Network security vs. app security: What's the difference, and why does it matter?

The idea that time and resources should be invested in either network security or application security is misguided as both are equally as important to securing the enterprise.

data breach hacker

Why thinking like a criminal is good for security

Focusing too much on protecting only the crown jewels of the enterprise might leave gaps in security for criminals who are seeking other valuable assets.

Security pros worried about stolen credentials, alert volumes

The majority of security organizations received more alerts than they can handle and don't have a way to spot stolen credentials, according to a survey released today

shoulder surfing

The threat of shoulder surfing should not be underestimated

Ira Winkler questions a recent column on the topic of shoulder surfing, also called visual hacking, and suggests that a better understanding of security awareness would go a long way.

Load More