Data and Information Security

Data and Information Security | News, how-tos, features, reviews, and videos

Google self driving car

How blockchain is hastening the advance of autonomous cars

Blockchain is quickly achieving parity between human and robotic drivers, and should soon accelerate self-driving solutions into the realm of statistical perfection.

eye on computer monitor showing privacy security or breach

EU privacy law says companies need to explain the algorithms they use

Explainable AI is needed to fully comply with the new EU data protection law. But companies don't need to sacrifice the benefits of machine learning accuracy to do it.

woman leader hipster execs diversity

Cybersecurity is every IT leader’s job

October is National Cyber Security Awareness Month, and is supposed to remind us of the magnitude of the growing cybersecurity threat. As if we needed reminding this year.

wireless network globe - internet of things edge [IoT] - edge computing

Can blockchain make IoT faster and more secure?

Blockchain technology will allow IoT devices to truly become autonomous – exchanging data, executing actions, and improving their own processes – all without any kind of centralized authority.

cyber attack virus meltdown

6 reasons why organizations need to boost their cyber-resilience

Despite skyrocketing cyber-security spending, 81% of CISOs still worry that data breaches remain unaddressed.

3 sensitive data hacker phone

Whose fingerprints are all over your customer data?

When compared to data warehousing, the data lake paradigm is incredibly appealing. But until you start working with the data, you don’t know what you don’t know. And that can be fatal.

VMware headquarters

How VMware is re-thinking security for the cloud era

With breaches making headlines around the world, the IT marketplace is looking for new ways to protect applications and data. With App Defense, VMware has built a security product with virtualization in mind.

mobile security data protection [Thinkstock]

5 ways you could avoid and prepare for cyberattacks in your organization

Preparing for any potential cyberattack is an increasingly important precautionary steps in every organization. Here's how your team could do it without disrupting existing processes.

blockchain ecosystem

Disruption by blockchain: real estate

How blockchain technology will disrupt the real estate industry.

android vs iOS security boxing gloves battle

Information security policies every business must implement

Important information security practices are often overlooked despite all the major hacks discovered in recent years. It is unfortunate that preventive measures are often adopted only after a crippling incident.

Cyber security breach attack on monitor with binary code

7 things startups need to know about cybersecurity

Cybersecurity is now simply one the many realities of doing business today. You should know the risks, and put programs in place that will help you avoid getting hit by cyberattacks down the line.

03 crimeware

Why are USB sticks wrinkle-free?

Roughly half of lost USB sticks and other mobile gadgets get returned to owners, which triggers the million-dollar question: What happens to the other half?

healthcare cloud

The incredible, shrinking shelf life of healthcare technology strategy

A perfect storm of policy uncertainty, marketplace transformation, and technology evolution has made strategic planning increasingly difficult for CIOs.

stock security

Cyber starts with skilled workers

Cyber attacks will continue to become more complex, frequent and destructive. Yet, when discussing cybersecurity, we consistently avoid focusing on the elephant in the room. We do not have enough cybersecurity professionals to help...

2 educate employees

Human liability in security

Cybersecurity is becoming an issue that is impossible to ignore and it is extremely complex in its nature. The one area that is critical and cannot be ignored is the human factor. You can buy all of the best firewalls and tools but...

cloud security lock

Stay out of security breach headlines: 3 things that must be addressed in your cloud agreement

If done correctly and with the proper level of insight, there are ways to mitigate the risks associated with such breaches.

fbis most wanted cybercriminals

FBI's top 10 most wanted cybercriminals

The internet has impacted the world in numerous ways, but it isn't always positive. Thanks to technology, we now have the rise of the cybercriminal, and the FBI even has a most wanted list for these criminals.

Maginot Line

Dell shifts security focus to data itself

Dell Data Guardian is a new type of security product that eschews Maginot-line-type walls and instead goes for protecting the data itself. Each file has its own encryption and security policy. This granular approach allows for a...

marketing man person communication

8 things CMOs need to know right now

At the recent Marketing Nation Summit, industry leaders offered CMOs tips and strategies for success — including why less is more when marketing to customers.

blockchain ecosystem

How the disruptive power of Blockchain could impact the digital economy

Blockchain holds plenty of promise for security and interoperability, but IT leaders are still trying to better understand the technology and how to put it to use. This much-hyped technology has an incredible power to disrupt many...

Load More