Data Security

Data security news, trends, analysis and practical advice

Digital Key, security, encryption
1 linkedin

Digital Key, security, encryption

Researchers crack the latest version of CryptXXX ransomware

Researchers from Kaspersky Lab have developed a method of decrypting files affected with the latest version of CryptXXX, a malware program that combines ransomware and information stealing capabilities.

marklogic 9 nosql database

MarkLogic 9 aims to make sure your data's safe when it's at rest

On Tuesday, one of today's newer database contenders unveiled an upcoming release featuring a major boost in security.

password theft

Researchers nab millions of stolen credentials for Gmail, Hotmail, Yahoo, banking

A hacker handed over millions of stolen credentials for Google, Microsoft and Yahoo email accounts, as well as thousands for banking, manufacturing and retail, in exchange for researchers liking and voting up his social media page.

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world.

planning

How to perform a risk assessment

A risk assessment gives you the information protection equivalent of the opposing team’s playbook, telling where and how attackers are most likely to strike and what the damage will be.

online security hacker

Microsoft's lawsuit, and retail's data-disclosure secrecy problem

When Microsoft on Thursday (April 14) sued the U.S. Justice Department demanding more openness about data seizures, it made the case that its customers have the right to know when their data in the cloud is being examined. Retail IT...

CSO Identity Management Survival Guide cover image

The CSO identity management survival guide

Research firm Gartner says identity management is "a crucial undertaking for any enterprise." This guide will help you communicate the challenges, learn from success stories and dive into the most valuable features of today's identity...

portrait of an embarrassed man peeking from behind his hand dv1912060

Don’t let embarrassment about a data breach cost you even more

Cyberthieves prey on human nature for even more profit.

1 title ransomwarethreats

How to respond to ransomware threats

It all depends upon your level of risk and how badly you want the data returned to you unharmed.

risk reward

Information security and the art of business enablement

In the security world today, we find that those managing security for organizations are often at odds with the business executives. But it doesn't have to be that way.

cso50 winners

CSO50 2016 winners announced

The CSO50 recognizes 50 security projects, taken on by 45 organizations, that demonstrate outstanding thought leadership and business value. These are their stories.

padlock and chain, security

Mizuho Bank eyes blockchain to speed international securities transactions

Japan's Mizuho Bank is considering using blockchain technology to speed the cross-border transfer of financial instruments.

EU-US Privacy Shield Logo

5 things you need to know about the EU-US Privacy Shield agreement

The Privacy Shield agreement is intended to guarantee the personal information of European Union citizens the same privacy protection when processed in the U.S. as it would receive at home. Here are five things to know about the...

The case for bitcoin

Cryptocurrency promises online transactions at lower cost and with better security. Will the current leading cryptocurrency, bitcoin, succeed? The industry needs to get more creative.

Vera Jourova

EU adds detail to Privacy Shield agreement, prepares to give it force of law

The European Commission has detailed the steps businesses must take to comply with the Privacy Shield data protection agreement, reached in principle with U.S. authorities earlier this month.

end of everything

Apple is right, the FBI demand makes us all less secure

Like it or not, you’re going to have to take sides in the brewing fight between the FBI and Apple over iPhone encryption.

01 shadowit

How to stop shadow IT

Security execs chime in on how to keep users from taking IT into their own hands.

destroyed hard drive

Data destruction 101: There's more to it than wiping your drive [Infographic]

What you need to know about preparing hard drives for reuse, recycling, and disposal.

Load More