Data and Information Security

Data and Information Security | News, how-tos, features, reviews, and videos

gavel justice judicial system law lawyer judge bureaucracy governance compliance
Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

A virtual sphere of photos of individuals appears against a cityscape.

Security job candidate background checks: What you can and can't do

Enterprise cybersecurity begins with a trustworthy staff. Here's how to ensure that current and prospective team members aren't hiding any skeletons.

cso ts ai ml by just super getty images 2400x1600

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how experts minimized their risk.

bucket with holes breach security vulnerability

SAP ASE leaves sensitive credentials in installation logs

Two vulnerabilities in SAP ASE's Cockpit component leaves some sensitive information available to anyone on the network and other data susceptible to brute-force attacks.

data science certification man at computer

14 IT certifications that will survive and thrive in the pandemic

These tech certifications not only have high value now, but employers will continue to value them as the coronavirus continues.

SAP

Install latest SAP Adaptive Server Enterprise patches, experts urge

If left unpatched, these SAP ASE vulnerabilities could give attackers full control of databases and servers.

cyber security abstract wall of locks padlocks

Enterprise security in 2020: How to keep attackers out

When every employee is part of the security equation, having a security culture that includes education, collaboration between IT operations and security teams, and security tools is essential. That was the consensus among...

tt19 030 thumb
video

How updates to MongoDB work to prevent data breaches | TECH(talk)

CSO senior writer Lucian Constantin and Computerworld Executive Editor Ken Mingis talk database security and how MongoDB's new field-level encryption takes security to the next level.

dark secrets of enterprise architecture men meetng in dark tunnel

12 dark secrets of encryption

With data security a key concern across all systems, encryption is increasingly becoming the go-to solution. But encryption may be less of a sure thing than you think.

decayed weathered distressed texture security weakened vulnverable

Protecting the digital economy

Our tech-addicted society has become much more vulnerable to cyberattacks, requiring CEOs to put security at the forefront of their agenda.

China Great Hall

Peace or ‘Star Wars’ – US vs. China

China’s technological and scientific “at all costs” expansion threatens global economic and political stability, especially to the United States and its allies. The Chinese threat is just as real as any impending danger from Iran,...

car salesman auto dealer keys

States should not rush to pass laws affecting auto dealer and auto consumer data

Due to cybersecurity and other impending regulations, patience is key.

money financial salary growth currency by davidleshem

5 cybersecurity jobs with the highest salaries in 2019

Why cybersecurity is one of the highest paid specialization areas in tech…and the five highest paid cybersecurity roles for 2019.

office meeting / silhouettes with devices and data in the foreground

Is a shortage of C-suite support getting in the way of corporate cyber-resilience?

77% of enterprises lack a cyber-security incident response plan, and only half of executives comprehend that cyber-resilience affects their brand and reputation.

Research report: IT security's looming tipping point

Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.

Load More