Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

security code big data cyberespionage byte
digital data surveillance eye

fraud infog primary

Has fraud met its match?

New and dynamic authentication factors can help prevent identity theft. The idea of using a fingerprint reader to log on to a smartphone is nothing new, but the latest wrinkle is the pressure with which that finger pushes on the...

Digital Key encryption

Stop using SHA1: It’s now completely unsafe

Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature.

3 bitcoin

Would killing Bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts explain that doing away with the cybercurrency would just force cybercriminals to find another anonymous way to extort money.

How You Will Get Hacked Next

Nowhere to hide: 9 new hacks coming to get you

The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm

Man looking worn out in mod orange chair with a wad of cash in a mouse trap

Users take the cheese to solve data breaches

Verizon releases its annual breach report that puts the reader in the driver's seat.

smartphone shocked group

The high price of security shaming [Infographic]

Two-thirds of IT security professionals said they would pay an average of $124,000 to avoid public scandals associated with security breaches.

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage.

wallet man money

To pay or not to pay: Too many victims say yes to ransomware

Ransomware’s success rate is so alarming that it is the subject of an all-day “summit” at this week’s RSA conference. Ironically, experts say defending against it is not terribly difficult, and how to do it is widely publicized – it’s...

glowing box

Rise of as-a-service lowers bar for cybercriminals

Widespread availability of RaaS and botnet rentals for DDoS attacks make it easy for those without technical skills to enter into cyber crime

2 not sick

Your personal info might be as sick as you

Moshe Ben-Simon, co-founder and vice president of TrapX Security, runs through how hospitals can shore up your data so that cybercriminals can’t get at it.

bullseye hospital healhcare

Hospital devices left vulnerable, leave patients at risk

A patient lies in a hospital bed waiting for a medical professional to conduct a blood gas analysis. Little does the patient know that his personal information is also undergoing a procedure. The database that stores patient data was...

cso50 intro

CSO50 2017: 50 forward-thinking security projects

The annual CSO50 conference in May will showcase cutting-edge technologies.

cso50 intro

CSO50 2017: A step ahead of the threats

The CSO50 awards honor innovative security projects that demonstrate thought leadership and outstanding business value.

01 challenges

What cyberinsurance gotchas companies must be ready for

CipherLoc Vice President Mike Salas details six challenges companies will face as the insurance industry begins to expand its presence in the cybersecurity industry.

credit cards keyboard

The 2017 state of strategic digital banking

Banks are struggling to survive through the digital age. In order to compete with FinTechs, regulatory mandates and consumer requirements, banks must be able to plug-and-play into the digital business ecosystem to recover market share...

clock and calendar montage

January 2017: The month in hacks and breaches

Hackers are off to a quick start in the new year.

data visualization heads users walking

Data realities of 2017 and beyond

There’s no escaping the facts anymore: Data rules everything now. Are IT leaders prepared to deal with that?

co workers

Why the 'smart' employee trend should worry us

Smart wearable technology continues to pervade every aspect of life, giving new opportunities, and dangers, for employers to abuse their workers.

Load More