Data Security

Data security news, trends, analysis and practical advice

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

online security hacker

Microsoft's lawsuit, and retail's data-disclosure secrecy problem

When Microsoft on Thursday (April 14) sued the U.S. Justice Department demanding more openness about data seizures, it made the case that its customers have the right to know when their data in the cloud is being examined. Retail IT...

CSO Identity Management Survival Guide cover image

The CSO identity management survival guide

Research firm Gartner says identity management is "a crucial undertaking for any enterprise." This guide will help you communicate the challenges, learn from success stories and dive into the most valuable features of today's identity...

portrait of an embarrassed man peeking from behind his hand dv1912060

Don’t let embarrassment about a data breach cost you even more

Cyberthieves prey on human nature for even more profit.

1 title ransomwarethreats

How to respond to ransomware threats

It all depends upon your level of risk and how badly you want the data returned to you unharmed.

risk reward

Information security and the art of business enablement

In the security world today, we find that those managing security for organizations are often at odds with the business executives. But it doesn't have to be that way.

cso50 winners

CSO50 2016 winners announced

The CSO50 recognizes 50 security projects, taken on by 45 organizations, that demonstrate outstanding thought leadership and business value. These are their stories.

padlock and chain, security

Mizuho Bank eyes blockchain to speed international securities transactions

Japan's Mizuho Bank is considering using blockchain technology to speed the cross-border transfer of financial instruments.

EU-US Privacy Shield Logo

5 things you need to know about the EU-US Privacy Shield agreement

The Privacy Shield agreement is intended to guarantee the personal information of European Union citizens the same privacy protection when processed in the U.S. as it would receive at home. Here are five things to know about the...

The case for bitcoin

Cryptocurrency promises online transactions at lower cost and with better security. Will the current leading cryptocurrency, bitcoin, succeed? The industry needs to get more creative.

Vera Jourova

EU adds detail to Privacy Shield agreement, prepares to give it force of law

The European Commission has detailed the steps businesses must take to comply with the Privacy Shield data protection agreement, reached in principle with U.S. authorities earlier this month.

end of everything

Apple is right, the FBI demand makes us all less secure

Like it or not, you’re going to have to take sides in the brewing fight between the FBI and Apple over iPhone encryption.

01 shadowit

How to stop shadow IT

Security execs chime in on how to keep users from taking IT into their own hands.

destroyed hard drive

Data destruction 101: There's more to it than wiping your drive [Infographic]

What you need to know about preparing hard drives for reuse, recycling, and disposal.

SAP headquarters in Walldorf, Germany.

SAP slaps a patch on leaky factory software

SAP's February round of critical software updates includes one for SAP Manufacturing Integration and Intelligence (xMII) that may be of interest to hackers and spies.

ecryption opener

Survey: The state of encryption is strong, but mind the gaps

Companies lag in protecting employee information, mobile devices.

prosoft data rescue one review pic

Review: Prosoft Data Rescue ONE

This device could save your digital life

security hacker code cyberespionage

Antivirus software could make your company more vulnerable

Cyberespionage groups could easily exploit vulnerabilities in antivirus programs to break into corporate networks, according to vulnerability researchers who have analyzed such products in recent years.

Digital Key, security, encryption

Ongoing MD5 support endangers cryptographic protocols

Researchers from the INRIA institute in France have devised several attacks that prove the continued support for MD5 in cryptographic protocols is much more dangerous than previously believed.

Load More