Data Security

Data Security | News, how-tos, features, reviews, and videos

decayed weathered distressed texture security weakened vulnverable
China Great Hall

car salesman auto dealer keys

States should not rush to pass laws affecting auto dealer and auto consumer data

Due to cybersecurity and other impending regulations, patience is key.

office meeting / silhouettes with devices and data in the foreground

Is a shortage of C-suite support getting in the way of corporate cyber-resilience?

77% of enterprises lack a cyber-security incident response plan, and only half of executives comprehend that cyber-resilience affects their brand and reputation.

audit binary compliance magnifying glass investigate

What is an IT auditor? A vital role for risk assessment

An IT auditor is responsible for analyzing and assessing an organization’s technological infrastructure to find problems with efficiency, risk management and compliance.

2 man with binoculars data breach research spy

We can’t hide from digital sleuths anymore

But privacy law can protect us from harm.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

3 ways Mastercard uses AI to fight fraud

Mastercard leans on cutting-edge AI tools to combat cybersecurity threats at a time when the world is moving toward digital payments facilitated by contextual commerce.

number five

5 ways to beef up your cyber defenses for 2019

Just because it looks like you might survive 2018 without a major cybersecurity breach, doesn't mean your company's all set for an air-tight 2019. Here's how to make sure you're prepared.

stateofcybercrimethumb

Escaping the line of fire: 2018 U.S. State of Cybercrime

One in four of organizations report greater monetary losses.

programmer certification skills developer devops data scientist laptop by brayden george unsplash

The hottest skills for tech contractors

Contractor hiring is on the rise. Discover the hottest skills for tech contractors and why employers are sourcing these skills from the independent workforce.

virtual brain / digital mind / artificial intelligence / machine learning / neural network

Wanted: Artificial and human intelligence to secure corporate data

Companies need both AI-driven automation and trained personnel to combat shape-shifting cyberthreats.

11 sharing

Data sharing: a problematic idea in search of a problem to solve

Proposals to require companies to share their data are riddled with flaws and solve no pressing marketplace defects.

data security encryption

When big data and cybersecurity collide

Protecting your company’s data starts with understanding it first.

Federal Reserve Board

Redefining what security means for federal agencies

Federal agencies are starting to use data provided by routine cybersecurity protocols to identify new ways to increase efficiencies and optimize citizen service.

question marks pavement

You‘re not paranoid if everyone is against you

When it comes to security, it's not a question of whether you're going to be attacked. You are. So, what's a CIO to do?

blue abstract password and login access security internet

The beginning of the end for passwords

Could we finally be on the verge of a ceasefire between employees, who want quick and easy access to their laptops at any cost, and IT managers, who need to secure those systems. This industry analyst thinks so.

number five

5 must-ask questions for complying with GDPR’s ‘Right to be Forgotten’

For all US-based companies that might have EU data, it’s time to segregate that data and initiate proper protocols to ensure fines don’t come your way after May.

facebook primary

Digital exhaust royalty: will it solve some of Facebook and Google’s personal data usage travails?

Has the time come now for users to be paid royalty for use of their “digital exhaust” by corporations like Facebook and Google? Will a digital exhaust royalty framework be win-win for both: the corporations whose business model is...

illustration showing interaction between human and artificially intelligent workers

Bridging the cyber skills gap with automation

More than ever, we need automation to move security from human to machine speed.

European Union [EU] flag-lock on top of a map of Europe

Becoming GDPR compliant quickly, effectively and risk-free

The hype around the GDPR compliance has recently reached the fever pitch recently. Thus, it seems essential to share the tips that help company become GDPR compliant without risks and on time.

Load More