Data and Information Security
Data and Information Security | News, how-tos, features, reviews, and videos
SAP ASE leaves sensitive credentials in installation logs
Two vulnerabilities in SAP ASE's Cockpit component leaves some sensitive information available to anyone on the network and other data susceptible to brute-force attacks.
14 IT certifications that will survive and thrive in the pandemic
These tech certifications not only have high value now, but employers will continue to value them as the coronavirus continues.
Install latest SAP Adaptive Server Enterprise patches, experts urge
If left unpatched, these SAP ASE vulnerabilities could give attackers full control of databases and servers.
What is data governance? A best practices framework for managing data assets
Data governance defines roles, responsibilities, and processes for ensuring accountability for and ownership of data assets across the enterprise.
Enterprise security in 2020: How to keep attackers out
When every employee is part of the security equation, having a security culture that includes education, collaboration between IT operations and security teams, and security tools is essential. That was the consensus among...
video
How updates to MongoDB work to prevent data breaches | TECH(talk)
CSO senior writer Lucian Constantin and Computerworld Executive Editor Ken Mingis talk database security and how MongoDB's new field-level encryption takes security to the next level.
12 dark secrets of encryption
With data security a key concern across all systems, encryption is increasingly becoming the go-to solution. But encryption may be less of a sure thing than you think.
Protecting the digital economy
Our tech-addicted society has become much more vulnerable to cyberattacks, requiring CEOs to put security at the forefront of their agenda.
Peace or ‘Star Wars’ – US vs. China
China’s technological and scientific “at all costs” expansion threatens global economic and political stability, especially to the United States and its allies. The Chinese threat is just as real as any impending danger from Iran,...
States should not rush to pass laws affecting auto dealer and auto consumer data
Due to cybersecurity and other impending regulations, patience is key.
5 cybersecurity jobs with the highest salaries in 2019
Why cybersecurity is one of the highest paid specialization areas in tech…and the five highest paid cybersecurity roles for 2019.
Is a shortage of C-suite support getting in the way of corporate cyber-resilience?
77% of enterprises lack a cyber-security incident response plan, and only half of executives comprehend that cyber-resilience affects their brand and reputation.
Cybercrime is increasing and more costly for organizations
CIOs need to focus on people-based attacks and use intelligent tools to limit data loss and business shutdowns.
What is an IT auditor? A vital role for risk assessment
An IT auditor is responsible for analyzing and assessing an organization’s technological infrastructure to find problems with efficiency, risk management and compliance.
Research/Infographic
Research report: IT security's looming tipping point
Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.
-
White Paper
-
eBook
Sponsored -
White Paper
-
Video/Webcast
Sponsored -
White Paper