Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

20151027 oracle cloud on building
Digital Key, security, encryption

How to avoid being the next Yahoo

It’s no longer about whether or not you’ll get attacked, it’s about knowing what the repercussions are and if you have the right controls to minimize or completely eliminate the fallout. In order to be able to do this effectively, you...


Enterprises outsmarting themselves with security, while attackers easily use common techniques

Attackers use common techniques to steal data, while companies focus too much on sophisticated attacks, according to the second annual Hacker's Playbook, based on an analysis of nearly 4 million breach methods.

red blue tools

Best tools for red and blue teams are methodology, experience

Since the tools vary based on environment, it's the skills and know-how that red/blue teams need most

Young man in tie with lifting silver weights

Information sharing still a heavy lift

Most security experts agree that sharing cyber threat information can help detect and contain it more effectively. But too many in the private sector still feel that sharing with government intelligence agencies feels more like...

controlling privacy

Security vs. privacy: The endless fiery debate continues

The debate about security vs. privacy has been going on since governments existed. It got a lot of discussion this week at the Cambridge Cyber Summit, but it remains unresolved.

worry concern nervous fret

8 challenges that keep financial services CTOs and CIOs up at night

Experts in financial services, IT, security and compliance discuss the major issues facing IT executives at financial services companies.

00 intro

Not so startling revelations of how a hacker broke in

These 10 ways are becoming all too common approaches, but yet users still fall for them.

Digital Key, security, encryption

Cerber ransomware kills database connections to access important data

In order to encrypt some of the most important data stored on computers and servers, the Cerber ransomware now tries to kill processes associated with database servers.

voter registration application

Hacking an election is about influence and disruption, not voting machines

Every time there's an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage. But can...

hacking elections

Q&A: The myths and realities of hacking an election

Election hacking has become a key topic during this year's presidential elections, more so now that candidates and voters are being actively targeted by actors that are assumed to be acting with Russian support. In this modified...


A nudge from ransomware

Our manager needs to get remote users’ PCs backed up without forcing them to connect to the network, which they rarely have to do these days to do their jobs.

protecting data

Turn data from risk liability into an asset

Data is an instrumental element to a corporations’ success or an enormous security risk

slack icon

Security for your collaborative software

There’s a gaping hole in your security infrastructure right now. The front door is open, the side window is ajar, and there’s an open safe with a neon sign saying “steal my data” in flashing lights.

smartphone shocked group

5 tips for protecting your brand on social media

This summer, online payment service giant Paypal learned that bad guys had set up a fake Paypal Support page on Twitter, and then monitored the real Paypal Support page for remarks from customers. The bad guys responded to those...

Firefox, Mozilla

Firefox blocks websites with vulnerable encryption keys

The popular Firefox browser will block access to HTTPS servers that use weak Diffie-Hellman keys.

01 intro myth

Security myths that can make you laugh… or cry

To help organizations cut through the noise to focus on improving security structures, security experts identify industry myths and provide suggestions to avoid falling for them. 

fiber internet ethernet cord networking

73% of companies using vulnerable end-of-life networking devices

Seventy-three percent of companies are using vulnerable, end-of-life networking equipment, up from 60 percent last year, according to a review of more than 212,000 Cisco networking devices at 350 organizations across North America

marten mickos

HackerOne CEO: 'We’re building the world’s biggest security talent agency'

Marten Mickos is crowdsourcing security with a growing army of ethical hackers who can help your company if you’re ready to adopt a new security mindset.

Load More