Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

Visa card
1 spear phishing intro

clock and calendar montage

November 2016: The month in hacks and breaches

Here's how the holiday season is heating up for hackers.

hacker hire

Hackers wanted

As its ‘bad guy’ stereotype wanes, hacker job postings in the enterprise jump 700% in three years.

usb stick

40% off Corsair Waterproof Shockproof 256GB USB 3.0 Flash Drive - Deal Alert

This USB 3.0 flash drive is designed to keep your files safe. The anodized, aircraft-grade aluminum housing is waterproof to 200 meters, vibration-resistant, and shock-resistant. USB 3.0 means read speeds up to four times faster than...

blame 174280704

Who's responsible for data compliance? 25% of executives don't know

A new survey sheds some light on just how little grasp U.S. organizations have on privacy and security regulations.

1 classroom

5 ways data classification can prevent an education data breach

Spirion CEO Jo Webber offers examples of how the education vertical can leverage data classification to reduce the risk of data theft and costly compliance violations.

seagate 4tb drive

33% off Seagate Expansion 4TB Desktop External Hard Drive USB 3.0

Instantly add space for more files, consolidate all of your files to a single location, or free up space on your computer's internal drive to help improve performance.

privacy and personalize

How privacy and personalization intersect in our data-filled world

For many this can seem like a catch-22, while consumers demand privacy, it's not likely they'll become long-term customers without some type of personalization.

screen shot 2016 11 28 at 10.07.10 am

29% off Seagate Expansion 8TB Desktop External Hard Drive USB 3.0

Instantly add space for more files, consolidate all of your files to a single location, or free up space on your computer's internal drive to help improve performance.

0 intro best practices

Best practices to fight corporate security risks

Ajit Sancheti, CEO and co-founder of Preempt, examines best practices each organization and their users must deploy, both in and out of corporate networks, to minimize malicious threats in inconspicuous (and conspicuous) places.

01 holiday phishing

10 top holiday phishing scams

It always happens this time of year, an influx of holiday-related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to...

ibm 1

IBM readies cybersecurity simulation center

Government agencies, law enforcement, security experts, and businesses joined IBM Security as they opened the industry's first commercial Cyber Range at their new global headquarters in Cambridge, Mass., today.

facebook magnify

Security experts divided on ethics of Facebook's password purchases

Last week, Facebook CSO Alex Stamos told conference attendees in Lisbon that the company buys stolen passwords on the black market, and some security experts are questioning the ethics and benefits of this approach.

personal privacy

How voice recognition will affect privacy in the Internet of Things

An Internet of Things (IoT) device using voice recognition requires the collection and interpretation of sounds. These sounds may extend far beyond the voice commands being given and cannot avoid being captured. How sound is captured...

looking ahead spying

12 steps to lower your espionage risk

Corporate espionage is the domain of companies that steal information to gain competitive advantage. Here's how to take the target off your back.

deals of week thumbnail

Best Deals of the Week, November 7th - November 11th - Deal Alert

Check out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of November 7th. All items are highly rated, and dramatically discounted.

01 newregs

Breaking down New York’s new cyber regulations

Ajay Arora, CEO & Co-founder of data security startup Vera, shares insight on navigating the New York's newest set of cybersecurity regulations to help firms adopt a security strategy that scales in the face of future cybersecurity...

cloud data warehouse

Visibility, security top concerns for cloud computing adoption

Enterprises considering adopting public clouds are concerned about where their data is located and how it's protected, according to a new survey by IDG.

dominos

Why senior managers are the most dangerous negligent insiders

If you really want to move the needle on data security in your organization, start at the top.

Load More