Data and Information Security

Data and Information Security | News, how-tos, features, reviews, and videos

A virtual sphere of photos of individuals appears against a cityscape.
cso ts ai ml by just super getty images 2400x1600

bucket with holes breach security vulnerability

SAP ASE leaves sensitive credentials in installation logs

Two vulnerabilities in SAP ASE's Cockpit component leaves some sensitive information available to anyone on the network and other data susceptible to brute-force attacks.

data science certification man at computer

14 IT certifications that will survive and thrive in the pandemic

These tech certifications not only have high value now, but employers will continue to value them as the coronavirus continues.

SAP

Install latest SAP Adaptive Server Enterprise patches, experts urge

If left unpatched, these SAP ASE vulnerabilities could give attackers full control of databases and servers.

gavel justice judicial system law lawyer judge bureaucracy governance compliance

What is data governance? A best practices framework for managing data assets

Data governance defines roles, responsibilities, and processes for ensuring accountability for and ownership of data assets across the enterprise.

cyber security abstract wall of locks padlocks

Enterprise security in 2020: How to keep attackers out

When every employee is part of the security equation, having a security culture that includes education, collaboration between IT operations and security teams, and security tools is essential. That was the consensus among...

tt19 030 thumb
video

How updates to MongoDB work to prevent data breaches | TECH(talk)

CSO senior writer Lucian Constantin and Computerworld Executive Editor Ken Mingis talk database security and how MongoDB's new field-level encryption takes security to the next level.

dark secrets of enterprise architecture men meetng in dark tunnel

12 dark secrets of encryption

With data security a key concern across all systems, encryption is increasingly becoming the go-to solution. But encryption may be less of a sure thing than you think.

decayed weathered distressed texture security weakened vulnverable

Protecting the digital economy

Our tech-addicted society has become much more vulnerable to cyberattacks, requiring CEOs to put security at the forefront of their agenda.

China Great Hall

Peace or ‘Star Wars’ – US vs. China

China’s technological and scientific “at all costs” expansion threatens global economic and political stability, especially to the United States and its allies. The Chinese threat is just as real as any impending danger from Iran,...

car salesman auto dealer keys

States should not rush to pass laws affecting auto dealer and auto consumer data

Due to cybersecurity and other impending regulations, patience is key.

money financial salary growth currency by davidleshem

5 cybersecurity jobs with the highest salaries in 2019

Why cybersecurity is one of the highest paid specialization areas in tech…and the five highest paid cybersecurity roles for 2019.

office meeting / silhouettes with devices and data in the foreground

Is a shortage of C-suite support getting in the way of corporate cyber-resilience?

77% of enterprises lack a cyber-security incident response plan, and only half of executives comprehend that cyber-resilience affects their brand and reputation.

6 indirect expenses cost money fine penalty pepi stojanovski unsplash

Cybercrime is increasing and more costly for organizations

CIOs need to focus on people-based attacks and use intelligent tools to limit data loss and business shutdowns.

audit binary compliance magnifying glass investigate

What is an IT auditor? A vital role for risk assessment

An IT auditor is responsible for analyzing and assessing an organization’s technological infrastructure to find problems with efficiency, risk management and compliance.

Research report: IT security's looming tipping point

Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.

Load More