Data Security

Keeping critical data secure in the cloud

Companies of all sizes are realizing the benefits of moving to private, public and hybrid clouds, but traditional security tools simply aren't working well in these environments.

Intrusion vs. breach: How security analytics & automated response can improve your chances of avoiding a breach

In this webinar, our guest speaker John Kindervag, Vice President, Principal Analyst at Forrester Research, and Seth Goldhammer, Director of Product Management at LogRhythm, will discuss how pervasive visibility and big data security analytics, when coupled with intelligent automated response, can substantially reduce an organization's risk of experiencing a material breach or cyber incident.

Cloud encryption—One shoe won't fit all

There is no question about the acceleration of data migrating to the cloud. But which cloud? All clouds: a mix of Infrastructure-, Platform- and Software-as-a-Service cloud models are being deployed by almost every organization.

The impact of endpoint data growth on corporate visibility & compliance

id you know that forty-six percent of IT knows or suspects employees are using their individual, non-IT approved cloud accounts to store corporate data?

FTC vigilant on data security, Ramirez tells Senate committee

By

The FTC Chairwoman cites 50 cases the commission has settled, including recent agreements with Fandango and Credit Karma.

Risk lessons over beer and bratwurst

Risk lessons over beer and bratwurst

After some experience with the European EMV "chip-and-PIN" card system while on vacation, the city of New York's CISO learned something about security: Don't take it for granted.

Sponsored Video: Yorgen Edholm, CEO, Accellion Inc.

By

Dan Kaplan, executive editor of SC Magazine, sits with Yogen Edholm, CEO of Accellion Inc., to discuss mobility in the workplace in this insightful In Focus video.

Play nicely with your Facebook friends

Play nicely with your Facebook friends

Perhaps Facebook users are beginning to expect more consideration from their friends on social networks.

Stupid is as stupid does: Four preventable data breaches in health care

Stupid is as stupid does: Four preventable data breaches in health care

When it comes to the causes of data breaches in health care, these are four scenarios that could have easily been prevented.

Big Data: The big picture

Big Data: The big picture

By

With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes better security decision making.

New Senate bill aims to prevent, deter data breaches

By

The Personal Data Protection and Breach Accountability Act of 2011 would require businesses with data of more than 10,000 customers to implement privacy and security programs.

Tax season: The IRS is the least of your concerns

Tax season: The IRS is the least of your concerns

With the April 18 tax deadline looming, security isn't top-of-mind for the employees in your finance, audit and operations departments.

Study finds $214 per breached record in 2010

By

Data breaches cost organizations $7.2 million on average in 2010, up seven percent from $6.8 million the previous year, according to a new study.

Defense in depth: building a holistic security infrastructure

Defense in depth: building a holistic security infrastructure

Organizations must consider security at the network, application, host and data layers to most effectively protect against threats.

Privacy commissioner convenes panel on data security

By

There was broad general support for establishing high standards of data security at a public forum convened by the Office of the Privacy Commissioner, but most respondents do not feel that the government should take the lead.

Microsoft confirms ASP.NET flaw, issues workaround

By

Microsoft late Friday issued a security advisory confirming the existence of an unpatched vulnerability that affects web applications built on ASP.NET.

Geek squad vs. mod squad: Should use policy become a federal beef?

Should violations of corporate computer use policy be a federal crime, asks Charles Jeter, ESET cybercrime investigator.

Regulation renovation: Regulatory compliance mandates

By

The effects of last year's regulatory changes have already begun to surface, reports Angela Moscaritolo.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US