Data Security

Data Security | News, how-tos, features, reviews, and videos

bucket with holes breach security vulnerability
cso ts ai ml by just super getty images 2400x1600

SAP

Install latest SAP Adaptive Server Enterprise patches, experts urge

If left unpatched, these SAP ASE vulnerabilities could give attackers full control of databases and servers.

gavel justice judicial system law lawyer judge bureaucracy governance compliance

What is data governance? A best practices framework for managing data assets

Data governance defines roles, responsibilities, and processes for ensuring accountability for and ownership of data assets across the enterprise.

dark secrets of enterprise architecture men meetng in dark tunnel

12 dark secrets of encryption

With data security a key concern across all systems, encryption is increasingly becoming the go-to solution. But encryption may be less of a sure thing than you think.

decayed weathered distressed texture security weakened vulnverable

Protecting the digital economy

Our tech-addicted society has become much more vulnerable to cyberattacks, requiring CEOs to put security at the forefront of their agenda.

China Great Hall

Peace or ‘Star Wars’ – US vs. China

China’s technological and scientific “at all costs” expansion threatens global economic and political stability, especially to the United States and its allies. The Chinese threat is just as real as any impending danger from Iran,...

car salesman auto dealer keys

States should not rush to pass laws affecting auto dealer and auto consumer data

Due to cybersecurity and other impending regulations, patience is key.

office meeting / silhouettes with devices and data in the foreground

Is a shortage of C-suite support getting in the way of corporate cyber-resilience?

77% of enterprises lack a cyber-security incident response plan, and only half of executives comprehend that cyber-resilience affects their brand and reputation.

audit binary compliance magnifying glass investigate

What is an IT auditor? A vital role for risk assessment

An IT auditor is responsible for analyzing and assessing an organization’s technological infrastructure to find problems with efficiency, risk management and compliance.

2 man with binoculars data breach research spy

We can’t hide from digital sleuths anymore

But privacy law can protect us from harm.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

3 ways Mastercard uses AI to fight fraud

Mastercard leans on cutting-edge AI tools to combat cybersecurity threats at a time when the world is moving toward digital payments facilitated by contextual commerce.

number five

5 ways to beef up your cyber defenses for 2019

Just because it looks like you might survive 2018 without a major cybersecurity breach, doesn't mean your company's all set for an air-tight 2019. Here's how to make sure you're prepared.

stateofcybercrimethumb

Escaping the line of fire: 2018 U.S. State of Cybercrime

One in four of organizations report greater monetary losses.

Research report: IT security's looming tipping point

Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.

Load More