Data Security

Data security news, trends, analysis and practical advice

Digital Key encryption
ransomware data laptop

eliminate insider threats 1

How to eliminate insider threats

Mike McKee, CEO OF ObserveIT, lists some tips to help organizations quickly jump on any irregularities that come from within your company’s network.

sandisk ixpand flash drive

33% off SanDisk iXpand Flash Drive 32GB for iPhone and iPad - Deal Alert

The perfect companion for your iPhone, the iXpand Flash Drive lets you free up space on your iPhone, back up your camera roll, and even watch videos straight from the drive4. The flexible Lightning connector works with most cases and...

binoculars looking watch outlook future

Study: 62% of security pros don’t know where their sensitive data is

Forrester report finds organizations struggle with understanding and controlling sensitive data.

05 tools

The essential guide to anti-malware tools

Admins can choose from a bevy of secondary scanners and specialized tools to clean up infected or infested PCs.

ransomware hardware security embedded circuit board integrated controller

Researchers propose a way to use your heartbeat as a password

Researchers at Binghamton State University have proposed a model that uses patients' heartbeats as an encryption key for electronic records.

01 holes

Tips on where to start in managing risk

Caroline Wong, vice president of security strategy at Cobalt, provides a few tips for managing risk in today’s modern business environment.

malware attack cyberespionage code hacker

Attackers start wiping data from CouchDB and Hadoop databases

Researchers are reporting data wiping attacks hitting openly accessible Hadoop and CouchDB deployments.

01 holes

Tips on where to start in managing risk

What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good...

backlit keyboard

How to handle security vulnerability reports

There are people out there willing to help with your company’s security issues. Isn’t it time your company had its own ‘see something, say something’ policy?

security code big data cyberespionage byte

After MongoDB attack, ransomware groups hit exposed Elasticsearch clusters

After deleting data from thousands of publicly accessible MongoDB databases, ransomware groups have started doing the same with Elasticsearch clusters that are accessible from the Internet and are not properly secured.

code hacker cyberespionage eye data

Disk-wiping malware Shamoon targets virtual desktop infrastructure

A cyber sabotage program that wiped data from 30,000 computers at Saudi Arabia's national oil company in 2012 has returned and is able to target server-hosted virtual desktops.

nup 173075 0006

Trump offers cybersecurity warning: 'No computer is safe'

President-elect Donald Trump weighed in on IT security at a New Year's Eve party, suggesting that the best way to keep secrets from hackers is a huge air gap.

seagate 4tb drive

27% off Seagate Expansion 4TB Desktop External Hard Drive USB 3.0

Instantly add space for more files, consolidate all of your files to a single location, or free up space on your computer's internal drive to help improve performance.

coopers tools

Free tools for your cyber-security efforts

There are enough quality gratis cyber security tools among the differing security product categories to make this free tool treasure hunt worth your while.

20160225 stock mwc ericsson booth security locks

Ransomware-fighting coalition adds members and decryption tools

The No More Ransom project, a coalition of law enforcement and security companies, has expanded with 30 new members and added 32 new decryption tools for various ransomware variants.

23589815634 22ba532414 o

5 things you should do following the Yahoo breach

Following a massive data breach that affected over one billion Yahoo accounts, users should review the settings of their accounts, clean their mailboxes and turn on additional account security features.

01 holiday phishing

10 top holiday phishing scams

It always happens this time of year, an influx of holiday-related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to...

Visa card

Merchant sites open door to Visa fraud

Visa dismisses the issue as a hypothetical attack method — but security researchers tried it and it worked.

Load More