Data Security

Data security news, trends, analysis and practical advice

Digital Key, security, encryption
stormy seas

revolving door

StackPath launches to build singular system for secure internet

Always interesting to see where a well-respected tech executive lands. Softlayer's Lance Crosby has ended up at StackPath.

01 magician

Tricks that ransomware uses to fool you

Cyphort has examined different variants of ransomware to help users get an idea of what might be coming down the Internet pipeline. So keep an eye out for these characteristics before your network is taken hostage.

Digital Key, security, encryption

Free decryption tools released for PowerWare and Bart ransomware

Security researchers released tools this week that could help users recover files encrypted by two relatively new ransomware threats: Bart and PowerWare.

old books

How to improve your incident-response plan

A well-formed, and well-tested, incident response can determine how well an organization responds to a data breach. CSO Online looks at how you can improve your own incident-response plan so to reduce the impact of that data breach.

Digital Key, security, encryption

New Locky ransomware version can operate in offline mode

The creators of the widespread Locky ransomware have added a fall-back mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers.

video

Security Sessions: Protecting data at the endpoint

In this episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Brett Hansen, executive director of Data Security Solutions at Dell, about keeping data safe in an increasingly mobile world.

hardware security embedded circuit board integrated controller

Cybersecurity firms step up intel sharing despite issues of trust

To keep hackers at bay, more security vendors have been trying to foster cooperation, and share data on the latest threats – even as it might spark concerns over trust and competition.

disaster recovery plan ts

Eight ingredients of an effective disaster recovery plan

IT executives and disaster recovery experts share their advice on how businesses can create an effective DR plan.

01 books primary

Take these security books with you on vacation

Why spend your beach time this summer reading mystery novels when real world mysteries are swirling through the cyber sphere? These books have been recommended by your security peers.

mind the gap 620x465

Study reveals security gap in big data projects

An IDG Enterprise study of big-data initiatives finds that the extremely valuable output of those projects often lacks additional security. Download the free report.

1 spear phishing intro

Inside a phishing attack

Several weeks ago, a key member of the WatchGuard Technologies finance team was targeted by a spear phishing attempt. Find out what they did to track down the phisher.

Digital Key, security, encryption

The number of corporate users hit by crypto ransomware is skyrocketing

The prevalence of ransomware programs, both those that encrypt data and those that don't, has exploded over the past two years, with companies being increasingly targeted.

acer chromebook r11 3qtr front
Update

Acer security breach exposes data of 34,500 online shoppers

Acer recently revealed its online store was the victim of a data breach that lasted nearly a year.

20160225 stock mwc ericsson booth security locks

5 things you should know about password managers

New data breaches are coming to light almost weekly and they reveal a simple fact: many people still choose weak passwords and reuse them across multiple sites. Password managers offer a solution.

128gb flashdrive

26% off Patriot 128GB USB 3.0 Flash Drive With 150MB/Sec Speed - Deal Alert

This flash drive support USB 3.0, transfers data at speeds up to 150MB/Sec, and is housed in a rugged shock and water resistent housing so your data stays safe on the go.

computer network cables internet switch ethernet

IT worker at Panama Papers firm arrested in Geneva

An IT worker at Mossak Fonseca, the company at the heart of the "Panama Papers" leak on offshore companies, was arrested in Geneva.

1 welcome

How to combat recent college grads' lack of security awareness

New graduates aren’t just bringing their skills and experience to the workplace – they’re also bringing poor cybersecurity habits.

office copiers hacked a

Printer security: Is your company's data really safe?

IT managers have found that printers can pose major cybersecurity risks --assuming they pay any attention to them at all.

Load More