data protection - News, Features, and Slideshows

Most popular

News about data protection
Tutorials about data protection
Features about data protection
  • Security must evolve to be 'all about the data'

    By Taylor Armerding | 25 July, 2014 10:35

    There is a fierce debate about whether GMOs - genetically modified organisms - with built-in resistance to pests, fungus, drought and other agricultural threats, are a good thing when it comes to our food supply.

  • Three strategies for the new era of enterprise cybersecurity

    By John N. Stewart | 18 June, 2014 06:11

    The pace of change for Information Technology is challenging established notions of "What is IT?" and "What is Information Security in the modern age?" For one example, the "new" data center technologies such as virtualization, Software-Defined Networking (SDN), service-oriented delivery models, and cloud computing have radically changed the typical IT infrastructure from a defined set of assets owned and controlled by the organization to a constantly fluctuating roster of resources that can come and go from IT department visibility and control.

  • 5 summer scams to watch out for this season

    By Taylor Armerding | 05 June, 2014 23:26

    It is almost summertime, and while the livin' supposedly gets a bit easier, it remains risky. As the vacation season approaches and everybody is planning travel, socializing with friends and family and relaxing, people in the "always connected" world should add one more item to their list: Don't relax when it comes to online security.

  • The use of mobile credentials is on the rise, but can they be secured?

    By Grant Hatchimonji | 03 June, 2014 05:05

    Given the current prevalence of mobile devices, especially smartphones, it comes as no surprise that they are becoming more and more entwined with everyday aspects of our lives. We don't just use them to make calls, to text, or to browse the internet anymore. We can use them to do just about anything, and that includes using them as a means to provide our credentials.

  • Needed: Breach detection correction

    By Taylor Armerding | 28 May, 2014 02:38

    There is no shame in being breached by a cyber attack -- security experts are unanimous about that. Prevention, while a worthy part of a risk management strategy, will never be 100% successful, given the sophistication and overwhelming volume of attacks.

Whitepapers about data protection

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

ZENworks® Endpoint Security Management

Get Powerful Protection for All of Your Mobile Devices

Latest Jobs
Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.