Data Security

Data security news, trends, analysis and practical advice

81p5l6fqewl. sl1500
checkmate chess

anil chakravarthy Informatica

Informatica CEO: 'Data security is an unsolved problem'

Companies today are awash in data, but current tools and processes are not enabling them to keep it secure. That's according to Informatica CEO Anil Chakravarthy, whose says his company is embarking on a major push to go further into...

supply chain

Feds to share supply chain threat reports with industry

The U.S. National Counterintelligence and Security Center will soon provide classified supply chain threat reports to critical U.S. telecommunications, energy and financial businesses.

Paul Stone Alex Chapman DEFCON WPAD

Disable WPAD now or have your accounts and private data compromised

Security researchers have recently highlighted serious risks introduced by the Web Proxy Auto-Discovery Protocol (WPAD), which is enabled by default on Windows and is supported by other operating systems as well.

12 backup

11 ways to fight off ransomware

These tips will help keep your PC safe from malware.

1 superhighway

6 high-tech ways thieves can steal connected cars

Your car provides you with more than just transportation. And criminals want all that information.

Patrick Watson Nir Valtman point-of-sale POS PIN pad card reader

Stealing payment card data and PINs from POS systems is easy

The communications between card readers and point-of-sale systems is not secure and attackers can tap them to steal payment card data and even PIN numbers.

Digital Key, security, encryption

Rival gang leaks decryption keys for Chimera ransomware

The creators of the Petya and Mischa ransomware programs leaked around 3,500 RSA private keys allegedly corresponding to systems infected with another ransomware program called Chimera.

stormy seas

U.S. and EU tech companies at sea with end of data Safe Harbor

New EU regimes are under consideration, but currently uncertainty reigns.

01 plan

9 steps to a successful incident response plan

It is of vital importance to have a plan in place before an incident hits your company.

revolving door

StackPath launches to build singular system for secure internet

Always interesting to see where a well-respected tech executive lands. Softlayer's Lance Crosby has ended up at StackPath.

01 magician

Tricks that ransomware uses to fool you

Cyphort has examined different variants of ransomware to help users get an idea of what might be coming down the Internet pipeline. So keep an eye out for these characteristics before your network is taken hostage.

Digital Key, security, encryption

Free decryption tools released for PowerWare and Bart ransomware

Security researchers released tools this week that could help users recover files encrypted by two relatively new ransomware threats: Bart and PowerWare.

old books

How to improve your incident-response plan

A well-formed, and well-tested, incident response can determine how well an organization responds to a data breach. CSO Online looks at how you can improve your own incident-response plan so to reduce the impact of that data breach.

Digital Key, security, encryption

New Locky ransomware version can operate in offline mode

The creators of the widespread Locky ransomware have added a fall-back mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers.

video

Security Sessions: Protecting data at the endpoint

In this episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Brett Hansen, executive director of Data Security Solutions at Dell, about keeping data safe in an increasingly mobile world.

hardware security embedded circuit board integrated controller

Cybersecurity firms step up intel sharing despite issues of trust

To keep hackers at bay, more security vendors have been trying to foster cooperation, and share data on the latest threats – even as it might spark concerns over trust and competition.

disaster recovery plan ts

Eight ingredients of an effective disaster recovery plan

IT executives and disaster recovery experts share their advice on how businesses can create an effective DR plan.

01 books primary

Take these security books with you on vacation

Why spend your beach time this summer reading mystery novels when real world mysteries are swirling through the cyber sphere? These books have been recommended by your security peers.

Load More