Data and Information Security

Data and Information Security | News, how-tos, features, reviews, and videos

stateofcybercrimethumb

Escaping the line of fire: 2018 U.S. State of Cybercrime

One in four of organizations report greater monetary losses.

programmer certification skills developer devops data scientist laptop by brayden george unsplash

The hottest skills for tech contractors

Contractor hiring is on the rise. Discover the hottest skills for tech contractors and why employers are sourcing these skills from the independent workforce.

virtual brain / digital mind / artificial intelligence / machine learning / neural network

Wanted: Artificial and human intelligence to secure corporate data

Companies need both AI-driven automation and trained personnel to combat shape-shifting cyberthreats.

11 sharing

Data sharing: a problematic idea in search of a problem to solve

Proposals to require companies to share their data are riddled with flaws and solve no pressing marketplace defects.

data security encryption

When big data and cybersecurity collide

Protecting your company’s data starts with understanding it first.

Federal Reserve Board

Redefining what security means for federal agencies

Federal agencies are starting to use data provided by routine cybersecurity protocols to identify new ways to increase efficiencies and optimize citizen service.

question marks pavement

You‘re not paranoid if everyone is against you

When it comes to security, it's not a question of whether you're going to be attacked. You are. So, what's a CIO to do?

blue abstract password and login access security internet

The beginning of the end for passwords

Could we finally be on the verge of a ceasefire between employees, who want quick and easy access to their laptops at any cost, and IT managers, who need to secure those systems. This industry analyst thinks so.

number five

5 must-ask questions for complying with GDPR’s ‘Right to be Forgotten’

For all US-based companies that might have EU data, it’s time to segregate that data and initiate proper protocols to ensure fines don’t come your way after May.

facebook primary

Digital exhaust royalty: will it solve some of Facebook and Google’s personal data usage travails?

Has the time come now for users to be paid royalty for use of their “digital exhaust” by corporations like Facebook and Google? Will a digital exhaust royalty framework be win-win for both: the corporations whose business model is...

illustration showing interaction between human and artificially intelligent workers

Bridging the cyber skills gap with automation

More than ever, we need automation to move security from human to machine speed.

European Union [EU] flag-lock on top of a map of Europe

Becoming GDPR compliant quickly, effectively and risk-free

The hype around the GDPR compliance has recently reached the fever pitch recently. Thus, it seems essential to share the tips that help company become GDPR compliant without risks and on time.

business people conference room collaboration boardroom

Board and management responsibilities for information security

Only 37% of corporate directors are confident with their organizations’ cyber security plans. What responsibilities do corporate and public-sector boards have for oversight of cyber and information security and what resources are...

access computer through your phone skeleton key unlocking

Establishing role-based access control in the workplace

Access control is necessary, and every organization must implement it in some form.

puzzle pieces problem solved teamwork collaboration

CIO 2020: Greater collaboration, and an end to control-based security

Given the meteoric rise in the number of security breaches in recent years, CIOs and CISOs need to be highly aligned and collaborative around every corporate initiative.

facial recognition - biometric security identification

Could a digital identity network prevent the next Equifax-like breach?

A military veteran equipped with a Harvard MBA launches digital identity startup to protect against future Equifax cyberattacks.

johann sebastian bach stamp

5 things J. S. Bach can teach you about information security

What can a centuries-old classical music composer teach today's CIOs about infosec? Plenty, it turns out...if you'll only listen.

container technology cloud

Best practices for a secure and trustworthy container platform strategy

Container technology has a direct impact on the agility of a software development team and consequently have seen a huge increase in interest, adoption and usage.

passport stamps

Blockchain IDs need international consensus

Just as they agreed on the booklet format of a passport and the information included within, they must also do so for the next generation of IDs.

hammer 154045038

Looking for nails to hit with my blockchain hammer

A Q&A with Adventium blockchain expert T.D. Smith

Load More