Data Security

Data Security | News, how-tos, features, reviews, and videos

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning
number five

stateofcybercrimethumb

Escaping the line of fire: 2018 U.S. State of Cybercrime

One in four of organizations report greater monetary losses.

programmer certification skills developer devops data scientist laptop by brayden george unsplash

The hottest skills for tech contractors

Contractor hiring is on the rise. Discover the hottest skills for tech contractors and why employers are sourcing these skills from the independent workforce.

virtual brain / digital mind / artificial intelligence / machine learning / neural network

Wanted: Artificial and human intelligence to secure corporate data

Companies need both AI-driven automation and trained personnel to combat shape-shifting cyberthreats.

11 sharing

Data sharing: a problematic idea in search of a problem to solve

Proposals to require companies to share their data are riddled with flaws and solve no pressing marketplace defects.

data security encryption

When big data and cybersecurity collide

Protecting your company’s data starts with understanding it first.

Federal Reserve Board

Redefining what security means for federal agencies

Federal agencies are starting to use data provided by routine cybersecurity protocols to identify new ways to increase efficiencies and optimize citizen service.

outsourcing suitcase with travel stickers at edge of dock

What you must know about business travel in an age of surveillance and censorship

As the number of gaps in employee device hardware and software mushrooms, CIO looks at enterprise best practices that mitigate catastrophic risk or prevent harm altogether.

question marks pavement

You‘re not paranoid if everyone is against you

When it comes to security, it's not a question of whether you're going to be attacked. You are. So, what's a CIO to do?

blue abstract password and login access security internet

The beginning of the end for passwords

Could we finally be on the verge of a ceasefire between employees, who want quick and easy access to their laptops at any cost, and IT managers, who need to secure those systems. This industry analyst thinks so.

number five

5 must-ask questions for complying with GDPR’s ‘Right to be Forgotten’

For all US-based companies that might have EU data, it’s time to segregate that data and initiate proper protocols to ensure fines don’t come your way after May.

facebook primary

Digital exhaust royalty: will it solve some of Facebook and Google’s personal data usage travails?

Has the time come now for users to be paid royalty for use of their “digital exhaust” by corporations like Facebook and Google? Will a digital exhaust royalty framework be win-win for both: the corporations whose business model is...

illustration showing interaction between human and artificially intelligent workers

Bridging the cyber skills gap with automation

More than ever, we need automation to move security from human to machine speed.

European Union [EU] flag-lock on top of a map of Europe

Becoming GDPR compliant quickly, effectively and risk-free

The hype around the GDPR compliance has recently reached the fever pitch recently. Thus, it seems essential to share the tips that help company become GDPR compliant without risks and on time.

business people conference room collaboration boardroom

Board and management responsibilities for information security

Only 37% of corporate directors are confident with their organizations’ cyber security plans. What responsibilities do corporate and public-sector boards have for oversight of cyber and information security and what resources are...

SHEp17
video

Spectre and Meltdown | Salted Hash Ep 17

What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.

access computer through your phone skeleton key unlocking

Establishing role-based access control in the workplace

Access control is necessary, and every organization must implement it in some form.

cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

puzzle pieces problem solved teamwork collaboration

CIO 2020: Greater collaboration, and an end to control-based security

Given the meteoric rise in the number of security breaches in recent years, CIOs and CISOs need to be highly aligned and collaborative around every corporate initiative.

Load More