Data Security

Data security news, trends, analysis and practical advice

ECJ Facebook safe harbor privacy
fireeye logo


Experian breach may have exposed data on 15M consumers linked to T-Mobile

A data breach at credit bureau Experian may have exposed data from T-Mobile USA on about 15 million U.S. consumers.

virtual encryption 175562932

GitHub expands hardware-based authentication to developers

GitHub developers will now be able to log in to the code repository using YubiKey hardware keys.

Target store exterior

Report: Target failed on security basics

Target hired Verizon to figure out what was behind its 2013 data breach and Verizon found that the company’s security problems can be summed up as failure to do the basics.

old billboard

Web-scraping bots scrape away profits

Web scraping is on the rise. How to detect and protect your intellectual property.

login prompt security screen

Dyreza malware steals IT supply chain credentials

New versions of the Dyreza computer Trojan are configured to steal credentials for order fulfillment, warehousing, inventory management, ecommerce and other IT and supply chain services.

cloud reboot

Time for an individual security reboot

We as consumers share some measure of responsibility for the cybersecurity mess the country is in, especially those of us who are IT or security professionals. We need to reboot our individual practices to become part of the solution....

diverse group seated in a circular classroom with professor in the middle

Does security awareness training even work?

If even well-educated security experts mess up when it comes to security, can we really educate average employees to be more security aware?

Elephant dog rain

BlueTalon brings Hadoop security down to the file system

Big data can mean big threats to security, but BlueTalon just launched what it calls the first-ever filtering and dynamic masking capabilities for use directly on the Hadoop Distributed File System (HDFS).


Ransomware pushers up their game against small businesses

File encrypting ransomware creators are increasingly focusing their attention on small and medium-sized businesses because they're more likely to pay up the ransom fees.


What can be done about rogue IT?

Securing a customers information is critical, and Kelly McGowan, the Senior Director of Information Technologies at American Securities, tells us about how they are helping clients start those conversations.

Victim of identity theft

OPM underestimated the number of stolen fingerprints by 4.5 million

The fingerprints of 5.6 million people have been stolen as a result of hackers who penetrated he computer systems of the U.S. Office of Personnel Management earlier this year.

dripping 28936 1280

Data loss by the drip

While the world is focused on news about major data breaches, we are overlooking the small, daily loss of key information such as passwords and confidential attachments. This data loss happens a bit at a time, much like water is lost...

clicks pageviews traffic denial of service ddos attack

Under DDoS attack? It could be just a distraction

When businesses are hit by noticeable DDoS attacks, three-quarters of the time those attacks are accompanied by another security incident, according to Kaspersky Lab.


Inherited risk: The downside of mergers

Enterprises going through mergers and acquisitions reap the benefits of new products and other assets, but they also acquire all of the threat vectors that have been targeting the other organization.  

0 title 7securityandprivacy

Seven security and privacy concerns at the polls

Despite email security issues that have dogged her campaign, respondents say Hillary Clinton is the most qualified to protect the U.S. from cyberattacks.

malware threat hack hacked bug cyberthreat

Eight ways to fend off spyware, malware and ransomware

Recent increases in cyberattacks and identity theft make it seem like the whole Internet is turning into the Dark Web. But while no system is unhackable, there are some painless precautions you can follow that might help keep you step...

xerox printed memory 20 bit memory label

Xerox introduces printed-memory labels to fight counterfeiting

Xerox's printed label contains 36 bits of rewritable memory that can store up to 68 billion points of data to determine if a product is genuine, among other things.

0 intro

7 reasons users have trust issues

A survey shows that employees have been trained to be untrusting souls

Load More