Most popular

News about data protection
Tutorials about data protection
Features about data protection
  • Cognitive bias: The risk from everyone in your organization, including you

    By Taylor Armerding | 09 April, 2014 23:29

    Risks to enterprises are not only of the security breach variety from outside attackers, malicious insiders or even careless employees. Another comes from everybody in an organization – even its most loyal, careful, capable members.

  • How MDM works -- or doesn't work -- for SMBs

    By Grant Hatchimonji | 08 April, 2014 23:38

    In large-scale organizations, implementing mobile device management (MDM) is typically given. After all, with so many employees using mobile devices that either contain or connect to sources of sensitive information, there needs to be some way to keep everything in check. But what about those companies that aren't big enough to be able to afford an MDM implementation and a full-sized IT department to manage it? Without a means to centralize the control of mobile devices, how can these smaller companies protect their data?

  • Ad tracking: Is anything being done?

    By Robert L. Mitchell | 02 April, 2014 22:19

    Online tracking is on the rise, but efforts to create a practical Do Not Track policy have slowed to a crawl. Meanwhile, users and browser companies are taking matters into their own hands.

  • Big data to tame the wolves of Wall Street

    By Sheila Lam | 12 March, 2014 00:47

    Stories like Jordan Belfort exist beyond the 80s. With the increasingly stringent regulatory requirements to tame the latest wolves of Wall Street, more financial institutes are turning towards proactive monitoring tools to avoid fraud. As big data is becoming a helpful tool to detect and alert potential fraud, the technology is also raising concern over its impact on personal data privacy.

  • CIO not the only one to blame for Target breach

    By Jaikumar Vijayan | 05 March, 2014 21:27

    That someone had to take the fall for the massive breach at Target is neither surprising nor unexpected. The only question is whether more heads will roll in the aftermath of one the biggest data compromises in retail history.

Whitepapers about data protection

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

IT Compliance Solutions

Enforce compliance consistently and cost-effectively across your organization.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.