Skip the navigation

Data Security Topic Center

What you need to know about data security and protecting sensitive information

Data Security News

Security must evolve to be 'all about the data'

There is a fierce debate about whether GMOs -- genetically modified organisms -- with built-in resistance to pests, fungus, drought and other agricultural threats, are a good thing when it comes to our food supply.
Read more...

Hackers steal user data from the European Central Bank website, demand money

Hackers have stolen user contact information, including email addresses and phone numbers, from the website of the European Central Bank and attempted to extort money from the institution.

SQL injection flaw opens door for Wall Street Journal database hack

A vulnerability in a web-based graphics system led to a breach of The Wall Street Journal's network by a hacker, the newspaper acknowledged late Tuesday.

Securing big data off to slow start

While so-called "big data" initiatives are not new to a number of industries a such as large financial services firms, pharmaceuticals, and large cloud companies a it is new to most organizations. And the low cost and ease of access of the software and hardware needed to build these systems, coupled with an eagerness to unleash any hidden value held within all of those enterprise data, are two trends that have sent large, next-generation database adoption soaring.

Microsoft settles with No-IP after seizing its domains in botnet hunt

Microsoft has reached a settlement with domain provider No-IP to disable some of its domains, after taking control of part of its network to shut down a botnet.

IBM to overcome data sovereignty fears with London data centre

IBM Softlayer opened a new London data centre yesterday, providing a local option for UK firms with data sovereignty concerns.

EFF sues the NSA to disclose use of software security flaws

The Electronic Frontier Foundation, a prominent digital privacy rights group, has filed a lawsuit against the U.S. National Security Agency to get it to specify the extent to which it might exploit software security flaws.

Hadoop's success drives efforts to make it more secure

Talk about big data and it won't take long for Hadoop to appear in the conversation. The Apache open source software is used to orchestrate clusters of commodity computers to crunch information from mountains of data.

Microsoft to resume email-based security notifications

Microsoft has backtracked on a plan to stop sending email-based notifications about security bulletins starting this month.

Google launches 'cookie choices' site to let Europeans know how they're being tracked

Google has launched a new site, CookieChoices.org, to help visitors of European sites learn more about the digital breadcrumbs they leave behind through cookies.

Data Security In Depth

How to Protect Personal, Corporate Information When You Travel

Before flying from Rome to Philadelphia earlier this summer, I stopped in the hotel lobby to print my boarding pass. The hotel had one computer dedicated solely to this task. It was the only public computer available to guests. I could access only airline websites and input my name and confirmation number for the ticket. That was it.

Developing a smart approach to SMAC security

Few security executives at global enterprises--or even at smaller organizations--have not had to deal with issues related to social media, mobile technology, big data/analytics, or cloud computing.

How to achieve better third-party security: Let us count the ways

No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties -- outside vendors, contractors, affiliates, partners and others.

Defending DevOps

DevOps is all about collaboration between operations teams and development teams. And the increase in collaboration should help enterprises to become more agile, eliminate waste, and automate, while also creating a more reliable infrastructure. It's about rapidly iterating, continuously improving, and being more competitive.

Three strategies for the new era of enterprise cybersecurity

The pace of change for Information Technology is challenging established notions of "What is IT?" and "What is Information Security in the modern age?" For one example, the "new" data center technologies such as virtualization, Software-Defined Networking (SDN), service-oriented delivery models, and cloud computing have radically changed the typical IT infrastructure from a defined set of assets owned and controlled by the organization to a constantly fluctuating roster of resources that can come and go from IT department visibility and control.

Invincea FreeSpace and ForeScout CounterACT: More than the sum of their parts

"In 2013, we estimated that the NAC market was 350 million dollars, which was an increase of about 55-percent over 2012," says Lawrence Orans, Research Vice President, Gartner, Inc. According to Orans, Gartner expects that growth to slow in 2014, with an estimated increase of 45-percent over 2013 numbers. Burgeoning enterprise BYOD concerns have been the major drivers in that growth, says Orans. NAC vendor ForeScout is integrating its capabilities with those of Invincea in order to further abate those concerns.

5 summer scams to watch out for this season

It is almost summertime, and while the livin' supposedly gets a bit easier, it remains risky. As the vacation season approaches and everybody is planning travel, socializing with friends and family and relaxing, people in the "always connected" world should add one more item to their list: Don't relax when it comes to online security.

The use of mobile credentials is on the rise, but can they be secured?

Given the current prevalence of mobile devices, especially smartphones, it comes as no surprise that they are becoming more and more entwined with everyday aspects of our lives. We don't just use them to make calls, to text, or to browse the internet anymore. We can use them to do just about anything, and that includes using them as a means to provide our credentials.

Needed: Breach detection correction

There is no shame in being breached by a cyber attack -- security experts are unanimous about that. Prevention, while a worthy part of a risk management strategy, will never be 100% successful, given the sophistication and overwhelming volume of attacks.

Dark Wallet--Threat or No Threat?

The Fuss About Dark Wallet

Internet of Things: Get the latest!
Internet of Things

Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!