Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

01 intro myth
fiber internet ethernet cord networking

marten mickos
Q&A

HackerOne CEO: 'We’re building the world’s biggest security talent agency'

Marten Mickos is crowdsourcing security with a growing army of ethical hackers who can help your company if you’re ready to adopt a new security mindset.

red apple

How to mitigate hackers who farm their victims

Feeling raked over? You’re not alone; someone is probably probing your low hanging fruit right now. CSO covers how hackers farm the enterprise and how companies can mitigate the risks.

usb stick

42% off Corsair Waterproof Shockproof 256GB USB 3.0 Flash Drive - Deal Alert

This USB 3.0 flash drive is designed to keep your files safe. The anodized, aircraft-grade aluminum housing is waterproof to 200 meters, vibration-resistant, and shock-resistant. USB 3.0 means read speeds up to four times faster than...

yahoo headquarters

Va. senator wants SEC probe of massive Yahoo breach

U.S. Sen. Mark Warner, D-Va., on Monday urged the U.S. Securities and Exchange Commission to investigate whether Yahoo met its legal obligations to keep the public and investors informed about a massive breach of 500 million Yahoo...

hilary clinton stage

Hillary Clinton’s email has vanished but why can’t yours?

Experts agree that recent high-profile cases demonstrate that emails can be permanently destroyed. But they also warn against complacency. They still recommend treating emails as if they really are “forever.”

security of things

How to keep terrifying medical device hacks from becoming reality

More medical devices are becoming connected ones, and that’s increasing the security threat surface, said panelists this week at the Security of Things Forum in Cambridge, Mass.

0 intro

6 expert tips to better secure third-party network access

Survey shows that enterprises are not worrying enough about outside access to their networks.

medical devices

Medical devices: Many benefits, but many insecurities

Security weaknesses in connected medical devices will not be resolved for a long time, a panel of experts at the recent Security of Things Forum said. But in the interim, security could be drastically improved just by eliminating...

colorful financial report with magnifying glass

Investigating Cybersecurity Incidents — a free course

Training provider Logical Operations offers a free online course on how to collect, preserve and analyze evidence from cybersecurity incidents — and prepare for the court case.

protecting data

How to protect your mission-critical information

A new report by the Information Security Forum (ISF) outlines the steps you can take to determine your mission-critical information assets &and create customized plans for protecting them.

muddy waters

Navigating the muddy waters of enterprise infosec

Information security finally has executives’ attention, but aligning with business needs is still challenging.

flexible

How flexible should your infosec model be?

Organizations need to stay on top of a fast-shifting threat landscape by updating their security policies -- without badgering users into a state of noncompliance.

Wearing multiple hats in IT

Security challenge: Wearing multiple hats in IT

Handling both security and IT duties involves a daily balancing act for the resource-constrained IT organizations that must take this approach. But along with the challenges, there can also be benefits.

grade blackboard cminus

Is security making the grade? What IT and business pros really think

When it comes to security, who’s in charge, where do roles and responsibilities overlap, and what are the biggest challenges to aligning infosec and business goals? A joint CSO, CIO, Computerworld survey sheds some light.

consulting contract

ISF consulting services seek to strengthen cyber resilience

The Information Security Forum has announced its global ISF Consultancy Services, which offer short-term customized professional support and training to help organizations build cyber resilience and improve their security posture.

stopwatch zero

The speed of ransomware: 3 seconds to encryption [Infographic]

Once you've clicked the phishing email, it's too late.

cloud question

What to think about when moving to the cloud

Thinking about making the idea of cloud a reality for today's enterprise

SSL padlock icon

Performance, management and privacy issues stymie SSL inspections — and the bad guys know it

The technology is there for companies to inspect the SSL traffic going in and out of their networks, but performance, management and privacy concerns combine to hinder its adoption -- allowing cyberattackers to hide their malicious...

Load More