Data Security

Data security news, trends, analysis and practical advice

Digital Key, security, encryption
marten mickos

ransomware hardware security embedded circuit board integrated controller

Here's how companies can deal with insider data theft

To learn that your company's data was stolen, not from any hacker, but from an employee is the nightmare scenario that no one wants to face. But it's also a risk that's very real.

Digital Key, security, encryption

Cerber ransomware kills processes needed to access data

In order to encrypt some of the most important data stored on computers and servers, the Cerber ransomware now tries to kill processes associated with database servers.

voter registration application

Hacking an election is about influence and disruption, not voting machines

Every time there's an election, the topic of hacking comes to the surface. During a presidential election, that conversation gets louder. But can you really hack an election? Maybe, but that depends on your goals.

hacking elections

Q&A: The myths and realities of hacking an election

Election hacking has become a key topic during this year's presidential elections. In this modified edition of CSO Online's Hacked Opinions series, we explore the myths and realities of hacking an election with a number of security...

ransomware locked computer stock image cropped

A nudge from ransomware

Our manager needs to get remote users’ PCs backed up without forcing them to connect to the network, which they rarely have to do these days to do their jobs.

Firefox, Mozilla

Firefox blocks websites with vulnerable encryption keys

The popular Firefox browser will block access to HTTPS servers that use weak Diffie-Hellman keys.

colorful financial report with magnifying glass

Investigating Cybersecurity Incidents — a free course

Training provider Logical Operations offers a free online course on how to collect, preserve and analyze evidence from cybersecurity incidents — and prepare for the court case.

usb stick

42% off Corsair Waterproof Shockproof 256GB USB 3.0 Flash Drive - Deal Alert

This USB 3.0 flash drive is designed to keep your files safe. The anodized, aircraft-grade aluminum housing is waterproof to 200 meters, vibration-resistant, and shock-resistant. USB 3.0 means read speeds up to four times faster than...

yahoo headquarters

Va. senator wants SEC probe of massive Yahoo breach

U.S. Sen. Mark Warner, D-Va., on Monday urged the U.S. Securities and Exchange Commission to investigate whether Yahoo met its legal obligations to keep the public and investors informed about a massive breach of 500 million Yahoo...

office leader ts classroom lecture group class

IT certifications report card: What are they worth now? Which ones pay off the most?

The first of a two-part series on IT certifications' multifaceted contribution to a prosperous, secure career in technology's busiest and most promising sectors and senior management in any enterprise.

muddy waters

Navigating the muddy waters of enterprise infosec

Information security finally has executives’ attention, but aligning with business needs is still challenging.

Wearing multiple hats in IT

Security challenge: Wearing multiple hats in IT

Handling both security and IT duties involves a daily balancing act for the resource-constrained IT organizations that must take this approach. But along with the challenges, there can also be benefits.

grade blackboard cminus

Is security making the grade? What IT and business pros really think

When it comes to security, who’s in charge, where do roles and responsibilities overlap, and what are the biggest challenges to aligning infosec and business goals? A joint CSO, CIO, Computerworld survey sheds some light.


How flexible should your infosec model be?

Organizations need to stay on top of a fast-shifting threat landscape by updating their security policies -- without badgering users into a state of noncompliance.

Big data

This tool sends alerts when your data is leaked

If you’re worried that your data might be in the hands of a hacker, one site is offering a free service that can give you a head’s up.

security code big data cyberespionage byte

MySQL zero-day exploit puts some servers at risk of hacking

A publicly disclosed vulnerability in the MySQL database could allow attackers to completely compromise some servers.

deals of the week

Best Deals of the Week, September 5th - September 9th - Deal Alert

Check out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of September 5th. All items are highly rated, and dramatically discounted!

Big data

Data hoarders are shining a spotlight on past breaches

Old data breaches carried out years ago are entering into the limelight again thanks to anonymous internet users like Keen.

Load More