Data Security

Data security news, trends, analysis and practical advice

home depot 620x465
blackberry passport

Data Security

Network security needs big data

As the inadequacies of perimeter-centric defenses become clearer, the zero-trust model grows more appealing. As for ZTM, it will need big data to succeed.

national security agency headquarters fort meade maryland

New tools offer practical help to block official spies

Online civil-rights groups and IBM accidentally struck a blow for individual freedom simultaneously with tools that limit covert surveillance from both hackers and governments

Apple Pay’s security pros and cons

Taking credit card numbers out of transactions is a helpful step that could alleviate the risk of giant data breaches, but that doesn’t mean the bad guys are going to give up and become accountants.

spy

Why Apple, Microsoft and others reject NSA spying

Unfettered state surveillance could damage some of America’s biggest brands — in its present form you could almost call it anti-American.

board of directors

Getting your board’s buy-in on cybersecurity

You don’t want your first discussion about cybersecurity with your company’s board to happen post-breach.

PCI Council looks to stem data breaches after bad year

The PCI Security Standards Council is hoping that emerging security technologies will help prevent breaches that made this year one of the worst ever.

data breach thinkstock

U.S. Postal Service suffers breach of employee, customer data

A U.S. Postal Service data breach has potentially compromised the personal information of 800,000 employees, as well as some customers who contacted the government service.

Hacked

BrowserStack hacked: Attacker sends email to customers alleging shoddy security

After a hacker sent email to BrowserStack customers that claimed the company had no firewalls in place, stored passwords in plain text and other shoddy security practices, BrowserStack admitted it was hacked. Yet the company claims...

Google releases tool to test apps and devices for SSL/TLS weaknesses

The tool simulates man-in-the-middle attacks to detect SSL/TLS vulnerabilities and implementation issues

sharing

IT pros turn a blind eye to file sharing practices, report says

Sixty-one percent have shared files through unencrypted email accounts.

usb drive

USB is now UEC (use with extreme caution)

USB is an acronym for Universal Serial Bus; at least that is what it has stood for since 1999 when it was patented. But now it may take on a new meaning and instead stand for Ultimate Security Breakdown.

Internet Explorer logo

Microsoft releases stopgap POODLE protection for Internet Explorer

Microsoft gave Windows customers an easier way to block attacks against Internet Explorer meant to steal browser session cookies and impersonate victims.

detour

Detoured by Shellshock and Poodle

As our manager tries to assess the risks he needs to mitigate at his new company, a couple of major vulnerabilities turn up to distract him.

we are hiring sign 155397417

For big raises in IT, look to mobile, security, big data

IT salaries will remain mostly stagnant in 2015, except for workers with highly coveted skill sets, according to a report tracking IT salaries and skills demand in the coming years.

data breach thinkstock

Backoff malware linked to data breaches is spreading

The number of computers in North America infected by the Backoff malware has risen sharply.

Researcher creates proof-of-concept worm for network-attached storage devices

Network-attached storage (NAS) devices are riddled with vulnerabilities that can put the security of sensitive data and networks at risk, a researcher has found. To prove his point, he has created a proof-of-concept worm that can...

national security agency headquarters fort meade maryland

Can the iPhone 6 really defeat the NSA?

There are loopholes in Apple’s claim, and law enforcement’s outrage seems disingenuous.

cybersecurity lock touch worker man

Researcher builds system to protect against malicious insiders

When an employee turns on his own company, the results -- damaged networks, data theft and even work stoppage -- could be devastating. Virginia Tech's Daphne Yao hopes the algorithms she's working on can stop that kind of attack.

Load More