Data Security News, Features, and Interviews

News

The Cyber Security Marketplace

​We have heard about the gaps in the marketplace – we can’t find good cyber security resources. I’ve also heard that students remark that I can’t get a job in cyber, even after doing a degree in this area.

David Gee | 25 May | Read more

More Data Security news

Reviews

Review: Secure Flash Drives

USB flash drives are the modern floppy, albeit considerably larger and faster. They make our lives easy for taking data on the road, sharing with colleagues over sneakernet, and given their rapidly increasing size even acting as backup devices. They're also darn handy for installing software from ISO images.

Ashton Mills | 13 Sep | Read more

USB Secure Flash Drive Product Review

A vast majority of today’s workforce use USB memory sticks, they offer unequalled convenience for transferring data. In most situations, if the data is not confidential, a standard USB stick quite acceptable, but what do you use if your data is sensitive?

Enex Testlab | 24 Aug | Read more

The security suite guide 2010

Just a few short years ago, all a PC needed for protection was a basic antivirus program to guard against any malware that arrived via an e-mail attachment, embedded in a shareware application or piggy-backed on a floppy disk.

Frank J. Ohlhorst | 18 Aug | Read more

More Data Security reviews

Slideshows

AISA National Conference: In pictures

- Amazon, Apple and Google know more about you than your doctor or lawyer - and Commbank is jealous as hell. - Don’t trust an organisation that doesn’t have a face - because then you can’t punch it in when they screw up, said Marcus Ranum. - 78 percent of the world’s population doesn’t have access to a computer or the internet and therefore avoid all IT security problems.

Zennith Geisler | 11 Nov | Read more

More Data Security slideshows

Features

Secure USB Drives Not So Secure

Several hardware-encrypted USB memory sticks are now part of a worldwide recall and require security updates because they contain a flaw which could allow hackers to easily gain access to the sensitive information contained on the device.

Joan Goodchild | 07 Jan | Read more

Is Compliance in the Cloud Possible?

There is no doubt that cloud computing is dominating today's IT conversation among C-level security executives. Whether it's due to the compelling cost saving possibilities in a tough economy, or because of perceived advantages in provisioning flexibility, auto-scaling, and on-demand computing, CSOs are probing the capabilities, costs and restrictions of the cloud. At the same time, security and compliance concerns are at the forefront of issues potentially holding large enterprises back from capitalizing on the benefits that cloud computing has to offer.

Jim Hietala | 07 Jan | Read more

Best Practices For IT Availability

Forrester often gets inquiries such as, "What requirements should we keep in mind while developing our disaster recovery plans and documents?" and, "Which strategies work best for managing our disaster recovery program once it's in place?"

Stephanie Balaouras | 17 Dec | Read more

A Practical Approach to Protecting Trade Secrets

Trade secrets are increasingly becoming a company's most valuable assets, and not surprisingly, threats to those assets have increased concomitantly. The greatest threat to company data is, of course, not outsiders but a company's own employees A company's ability to protect against rogue employees (as well as against unintentional harm) is governed by both federal and state laws, which vary by jurisdiction and, worse, are in a state of flux in many of those jurisdictions.

Russell Beck and Matt Karlyn | 12 Nov | Read more

More Data Security features

Tutorials

More Data Security tutorials

Opinions

Is Your Enterprise Mobility Strategy Good?

There are numerous benefits to creating a mobile workforce, including improved information sharing, increased productivity and greater work flexibility. But this has left many enterprises having to manage the need to balance connecting more devices, apps and data to enable business productivity while at the same time tightly handling security and controlling cost.

Billy Ho | 27 Apr | Read more

Securing the enterprise in a brave new digital world

The security threat landscape has changed dramatically in ways unfathomable from just a few years ago. In today’s digital world where applications range in the millions, organizations need to be aware of the fact that enterprise infrastructure is not the only vulnerable spot for hackers.

Martyn Young | 27 Apr | Read more

Cyberwar Incident Response at the Speed of Thought

In a combat situation, our soldiers wear and carry different types and amounts of equipment, compared to when they are on normal duties. In some high risk situations they’re expected to carry around 60 kilograms worth of kit, including their gun, ammunition, armour, helmet and boots.

Nick Race | 12 Apr | Read more

More Data Security opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place