Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

anil chakravarthy Informatica
pixelated clouds reflecting on building windows

life preserver

Data lakes security could use a life preserver

As big data initiatives gain steam at organizations, many companies are creating “data lakes” to provide a large number of users with access to the data they need. And as with almost every type of new IT initiative, this comes with a...

1 briefcase

What you need to do to stop data from leaving with exiting employees

In some instances it is inadvertent that an employee takes files with them when they leave a job. But in most cases, it is done to get an advantage at their next job. Here is what you should do before they leave the premises.

car smartphone

A push for the less-hackable car

Automotive cybersecurity finally looks like it is on the front burner. But a host of improvements need to be made before the connected car is even relatively safe from hacks.

1 safe

8 tips for keeping your data safe with Identity and Access Management

With the proliferation of cloud applications, IAM solutions are a necessity.With these tips for good password hygiene and deploying an identity and access management (IAM) solution, you can keep your data safe from the rapidly...

01 insurance

Why doesn’t my cybersecurity insurance cover that?

There is still no standard approach on which the insurance industry underwrites cyber liability coverage. Find out some answers from an industry expert.

steal thief theft burglar laptop secret crime

Laptops most often stolen from most unlikely place

The rise of mobile has led many CIOs to fret about data loss from lost or stolen devices. A new study suggests IT theft in the office should be a primary concern.

supply chain

U.S. intelligence to share supply chain threat reports with industry

The U.S. National Counterintelligence and Security Center will soon provide classified supply chain threat reports to critical U.S. telecommunications, energy and financial businesses.

0 primary

6 shocking gaps in your data security strategy

Find out where CISOs are shifting their investments to close 6 of the most challenging security gaps in today’s enterprise security strategies.

Paul Stone Alex Chapman DEFCON WPAD

Disable WPAD now or have your accounts and private data compromised

Security researchers have recently highlighted serious risks introduced by the Web Proxy Auto-Discovery Protocol (WPAD), which is enabled by default on Windows and is supported by other operating systems as well.

phishing password

How to block phishers when they come a knockin’

If you lockdown your network, cybercriminals will move on to find more low hanging fruit.

fake ransomeware letter 1

How to detect a fake ransomware letter

As the number of ransomware demands increase, users should be aware of hollow threats.

keeping score

What’s in a security score?

In May, FICO upped its own scoring game. It acquired cybersecurity firm QuadMetrics to create its own brand of enterprise security scores for enterprises. The new scoring tool, available in August, uses predictive analytics and...

Patrick Watson Nir Valtman point-of-sale POS PIN pad card reader

Stealing payment card data and PINs from POS systems is dead easy

The communications between card readers and point-of-sale systems is not secure and attackers can tap them to steal payment card data and even PIN numbers.

gap stretching

Insurers working to fill cyberinsurance data gaps

Insurers are starting to expand their services to better educate their customers about cyber risk and even help them defend against attacks before they happen and deal with the fallout of when a breach does occur

laptop shock

4 laptop security trends you should know about

These new techniques and products are not as widely known, yet they are effective for any laptop-carrying business worker who needs to fend off the latest attacks.

1 authentication

Why you need a strong authentication platform

With strong authentication, you can work securely across devices and locations, reduce IT burden and control costs, and secure consumer access to your data. Symantec’s Information Protection Team offers tips for addressing common...

money ransom

Experts: SentinelOne ransomware guarantee no replacement for cyberinsurance

Earlier this week, SentinelOne announced that it will reimburse customers for up to $1 million if they are hit by a ransomware attack, but some experts say that this is a marketing gimmick and no replacement for a solid cyberinsurance...

point of sale credit card pci

EMV transition involves many moving parts

There's a lot of finger pointing going around about why the transition is going so slowly, but the bottom line, according to experts, is that the United States has a more complicated infrastructure than other countries and the...

Load More