Skip the navigation

Data Security Topic Center

What you need to know about data security and protecting sensitive information

Data Security News

Microsoft settles with No-IP after seizing its domains in botnet hunt

Microsoft has reached a settlement with domain provider No-IP to disable some of its domains, after taking control of part of its network to shut down a botnet.
Read more...

IBM to overcome data sovereignty fears with London data centre

IBM Softlayer opened a new London data centre yesterday, providing a local option for UK firms with data sovereignty concerns.

EFF sues the NSA to disclose use of software security flaws

The Electronic Frontier Foundation, a prominent digital privacy rights group, has filed a lawsuit against the U.S. National Security Agency to get it to specify the extent to which it might exploit software security flaws.

Hadoop's success drives efforts to make it more secure

Talk about big data and it won't take long for Hadoop to appear in the conversation. The Apache open source software is used to orchestrate clusters of commodity computers to crunch information from mountains of data.

Microsoft to resume email-based security notifications

Microsoft has backtracked on a plan to stop sending email-based notifications about security bulletins starting this month.

Google launches 'cookie choices' site to let Europeans know how they're being tracked

Google has launched a new site, CookieChoices.org, to help visitors of European sites learn more about the digital breadcrumbs they leave behind through cookies.

Microsoft's crusade against malware advances to Kuwait, Algeria

Microsoft has taken legal action to combat the spread of malware that the company says can be traced to bad actors in Kuwait and Algeria.

Google develops a 'boring' version of OpenSSL

Google is developing its own version of OpenSSL that will be more appropriate for its own software products, which have been using the critical encryption component for years with customized patches.

Hacker puts 'full redundancy' code-hosting firm out of business

A code-hosting and project management services provider was forced to shut down operations indefinitely after a hacker broke into its cloud infrastructure and deleted customer data, including most of the company's backups.

Amazon CTO says business unaffected by Snowden revelations

Breaking with other players in the IT industry, Amazon's CTO has downplayed any impact of the Edward Snowden revelations on its international business.

Data Security In Depth

How to achieve better third-party security: Let us count the ways

No enterprise is an island. In a connected world, a business cannot function without multiple relationships with third parties -- outside vendors, contractors, affiliates, partners and others.

Defending DevOps

DevOps is all about collaboration between operations teams and development teams. And the increase in collaboration should help enterprises to become more agile, eliminate waste, and automate, while also creating a more reliable infrastructure. It's about rapidly iterating, continuously improving, and being more competitive.

Three strategies for the new era of enterprise cybersecurity

The pace of change for Information Technology is challenging established notions of "What is IT?" and "What is Information Security in the modern age?" For one example, the "new" data center technologies such as virtualization, Software-Defined Networking (SDN), service-oriented delivery models, and cloud computing have radically changed the typical IT infrastructure from a defined set of assets owned and controlled by the organization to a constantly fluctuating roster of resources that can come and go from IT department visibility and control.

Invincea FreeSpace and ForeScout CounterACT: More than the sum of their parts

"In 2013, we estimated that the NAC market was 350 million dollars, which was an increase of about 55-percent over 2012," says Lawrence Orans, Research Vice President, Gartner, Inc. According to Orans, Gartner expects that growth to slow in 2014, with an estimated increase of 45-percent over 2013 numbers. Burgeoning enterprise BYOD concerns have been the major drivers in that growth, says Orans. NAC vendor ForeScout is integrating its capabilities with those of Invincea in order to further abate those concerns.

5 summer scams to watch out for this season

It is almost summertime, and while the livin' supposedly gets a bit easier, it remains risky. As the vacation season approaches and everybody is planning travel, socializing with friends and family and relaxing, people in the "always connected" world should add one more item to their list: Don't relax when it comes to online security.

The use of mobile credentials is on the rise, but can they be secured?

Given the current prevalence of mobile devices, especially smartphones, it comes as no surprise that they are becoming more and more entwined with everyday aspects of our lives. We don't just use them to make calls, to text, or to browse the internet anymore. We can use them to do just about anything, and that includes using them as a means to provide our credentials.

Needed: Breach detection correction

There is no shame in being breached by a cyber attack -- security experts are unanimous about that. Prevention, while a worthy part of a risk management strategy, will never be 100% successful, given the sophistication and overwhelming volume of attacks.

Dark Wallet--Threat or No Threat?

The Fuss About Dark Wallet

Evan Schuman: One law to rule all data breaches -- but let's make it a real law

The White House's big report on big-data privacy has several shortcomings.

Security Manager's Journal: A deal that's too good to be true

An offshore coding vendor offers a great price for quality work, but it may be stealing the company's source code.

Internet of Things: Get the latest!
Internet of Things

Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!