Data Security

Data Security | News, how-tos, features, reviews, and videos

European Union [EU] flag-lock on top of a map of Europe

Becoming GDPR compliant quickly, effectively and risk-free

The hype around the GDPR compliance has recently reached the fever pitch recently. Thus, it seems essential to share the tips that help company become GDPR compliant without risks and on time.

business people conference room collaboration boardroom

Board and management responsibilities for information security

Only 37% of corporate directors are confident with their organizations’ cyber security plans. What responsibilities do corporate and public-sector boards have for oversight of cyber and information security and what resources are...

access computer through your phone skeleton key unlocking

Establishing role-based access control in the workplace

Access control is necessary, and every organization must implement it in some form.

puzzle pieces problem solved teamwork collaboration

CIO 2020: Greater collaboration, and an end to control-based security

Given the meteoric rise in the number of security breaches in recent years, CIOs and CISOs need to be highly aligned and collaborative around every corporate initiative.

facial recognition - biometric security identification

Could a digital identity network prevent the next Equifax-like breach?

A military veteran equipped with a Harvard MBA launches digital identity startup to protect against future Equifax cyberattacks.

johann sebastian bach stamp

5 things J. S. Bach can teach you about information security

What can a centuries-old classical music composer teach today's CIOs about infosec? Plenty, it turns out...if you'll only listen.

container technology cloud

Best practices for a secure and trustworthy container platform strategy

Container technology has a direct impact on the agility of a software development team and consequently have seen a huge increase in interest, adoption and usage.

passport stamps

Blockchain IDs need international consensus

Just as they agreed on the booklet format of a passport and the information included within, they must also do so for the next generation of IDs.

hammer 154045038

Looking for nails to hit with my blockchain hammer

A Q&A with Adventium blockchain expert T.D. Smith

Google self driving car

How blockchain is hastening the advance of autonomous cars

Blockchain is quickly achieving parity between human and robotic drivers, and should soon accelerate self-driving solutions into the realm of statistical perfection.

eye on computer monitor showing privacy security or breach

EU privacy law says companies need to explain the algorithms they use

Explainable AI is needed to fully comply with the new EU data protection law. But companies don't need to sacrifice the benefits of machine learning accuracy to do it.

woman leader hipster execs diversity

Cybersecurity is every IT leader’s job

October is National Cyber Security Awareness Month, and is supposed to remind us of the magnitude of the growing cybersecurity threat. As if we needed reminding this year.

wireless network globe - internet of things edge [IoT] - edge computing

Can blockchain make IoT faster and more secure?

Blockchain technology will allow IoT devices to truly become autonomous – exchanging data, executing actions, and improving their own processes – all without any kind of centralized authority.

Hacking stealing password data.

4 ways to halt data thieves

Small- to medium-sized businesses struggle to reduce the complexity of cyber security management while maintaining defenses against a growing threat landscape. All security professionals and solution providers will agree that...

cyber attack virus meltdown

6 reasons why organizations need to boost their cyber-resilience

Despite skyrocketing cyber-security spending, 81% of CISOs still worry that data breaches remain unaddressed.

3 sensitive data hacker phone

Whose fingerprints are all over your customer data?

When compared to data warehousing, the data lake paradigm is incredibly appealing. But until you start working with the data, you don’t know what you don’t know. And that can be fatal.

VMware headquarters

How VMware is re-thinking security for the cloud era

With breaches making headlines around the world, the IT marketplace is looking for new ways to protect applications and data. With App Defense, VMware has built a security product with virtualization in mind.

mobile security data protection [Thinkstock]

5 ways you could avoid and prepare for cyberattacks in your organization

Preparing for any potential cyberattack is an increasingly important precautionary steps in every organization. Here's how your team could do it without disrupting existing processes.

android vs iOS security boxing gloves battle

Information security policies every business must implement

Important information security practices are often overlooked despite all the major hacks discovered in recent years. It is unfortunate that preventive measures are often adopted only after a crippling incident.

Cyber security breach attack on monitor with binary code

7 things startups need to know about cybersecurity

Cybersecurity is now simply one the many realities of doing business today. You should know the risks, and put programs in place that will help you avoid getting hit by cyberattacks down the line.

Load More