Data Security

Data security news, trends, analysis and practical advice

usb stick
yahoo headquarters

office leader ts classroom lecture group class

IT certifications report card: What are they worth now? Which ones pay off the most?

The first of a two-part series on IT certifications' multifaceted contribution to a prosperous, secure career in technology's busiest and most promising sectors and senior management in any enterprise.

muddy waters

Navigating the muddy waters of enterprise infosec

Information security finally has executives’ attention, but aligning with business needs is still challenging.

Wearing multiple hats in IT

Security challenge: Wearing multiple hats in IT

Handling both security and IT duties involves a daily balancing act for the resource-constrained IT organizations that must take this approach. But along with the challenges, there can also be benefits.

grade blackboard cminus

Is security making the grade? What IT and business pros really think

When it comes to security, who’s in charge, where do roles and responsibilities overlap, and what are the biggest challenges to aligning infosec and business goals? A joint CSO, CIO, Computerworld survey sheds some light.

flexible

How flexible should your infosec model be?

Organizations need to stay on top of a fast-shifting threat landscape by updating their security policies -- without badgering users into a state of noncompliance.

Big data

This tool sends alerts when your data is leaked

If you’re worried that your data might be in the hands of a hacker, one site is offering a free service that can give you a head’s up.

security code big data cyberespionage byte

MySQL zero-day exploit puts some servers at risk of hacking

A publicly disclosed vulnerability in the MySQL database could allow attackers to completely compromise some servers.

deals of the week

Best Deals of the Week, September 5th - September 9th - Deal Alert

Check out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of September 5th. All items are highly rated, and dramatically discounted!

Big data

Data hoarders are shining a spotlight on past breaches

Old data breaches carried out years ago are entering into the limelight again thanks to anonymous internet users like Keen.

USB armory

A USB device makes it easy to steal credentials from locked PCs

A security researcher demonstrated that all it takes to steal an OS account's password hash from a Windows computer in a locked state, is to plug in a special USB device for a few seconds.

apc battery backup

15% off APC 650VA 8-outlet Uninterruptible Power Supply and Surge Protector - Deal Alert

This backup power supply from APC provides guaranteed power for desktop computers, wireless networks, gaming consoles and other electronics, allowing you to work through power outages and protect your data and equipment.

screen shot 2016 09 06 at 10.54.10 am

U.S. investigates Russia for election hack attacks

Intelligence and law enforcement agencies are investigating whether Russia has launched a broad covert operation to disrupt the U.S. elections in November, according to a news report.

81p5l6fqewl. sl1500

25% off Seagate Backup Plus Ultra Slim 2TB Portable External Hard Drive - Deal Post

The Backup Plus Ultra Slim Portable Drive is one of Seagate's thinnest and most eye-catching portable hard drives

checkmate chess

Real-life examples test whether you are prepared for a cyberattack

Use the following tabletop exercises -- based on today’s most disconcerting threats -- to update your response plan for live action.

anil chakravarthy Informatica

Informatica CEO: 'Data security is an unsolved problem'

Companies today are awash in data, but current tools and processes are not enabling them to keep it secure. That's according to Informatica CEO Anil Chakravarthy, whose says his company is embarking on a major push to go further into...

supply chain

Feds to share supply chain threat reports with industry

The U.S. National Counterintelligence and Security Center will soon provide classified supply chain threat reports to critical U.S. telecommunications, energy and financial businesses.

Paul Stone Alex Chapman DEFCON WPAD

Disable WPAD now or have your accounts and private data compromised

Security researchers have recently highlighted serious risks introduced by the Web Proxy Auto-Discovery Protocol (WPAD), which is enabled by default on Windows and is supported by other operating systems as well.

12 backup

11 ways to fight off ransomware

These tips will help keep your PC safe from malware.

Load More