data protection - News, Features, and Slideshows
data protection in pictures
Sony Pictures on Wednesday canceled the Dec. 25 release of its controversial comedy, "The Interview," after theater chains decided not to play the film following terrorist threats after a cyber attack.
By Zach Miners | 18 December, 2014 10:57
After Sony Pictures Entertainment's computer network was breached in late November, it appeared the hackers wanted to blackmail the company.
By Jeremy Kirk | 16 December, 2014 03:10
Last week, I went to a project meeting so I could provide security insights as some consulting software developers updated us on the customer-facing application they're building for us. But I was dumbfounded when they asked me, "How should we encrypt the passwords?" Will developers never learn?
By By J.F. Rice | 03 December, 2014 01:19
Chip-and-PIN payment cards have a strong supporter in the hotbed of payment technologies, with San Francisco's district attorney promoting the new technology as a way to cut down on fraud.
By Zach Miners | 26 November, 2014 11:16
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
It has been an exceptional year for IT security breaches, which have become part of an escalating trend in destructive attacks. And they're going to get worse.
By Patrick Thibodeau | 19 December, 2014 04:29
The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the US payment system to smartcard technology can't happen fast enough.
By Jaikumar Vijayan | 16 August, 2014 20:49
That someone had to take the fall for the massive breach at Target is neither surprising nor unexpected. The only question is whether more heads will roll in the aftermath of one the biggest data compromises in retail history.
By Jaikumar Vijayan | 05 March, 2014 21:27
Whitepapers about data protection
This paper outlines the 14 “best practice” tips to help manage the security threats you’re potentially facing. By downloading you’ll learn: • The steps you should follow to protect your organisation from security threats • The measures and policies you should have in place from start to finish • Plus, get an opportunity to get the full picture on the current internet security threat environment
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
This document provides the findings of a recent security analysis of your infrastructure. The document represents a summary of these findings and presents a set of recommendations for addressing the detected events.
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright
- FBI concludes North Korea 'responsible' for Sony hack
- What we know about North Korea's cyberarmy
- Cyberattack on German steel factory causes 'massive damage'
- Blackberry reports falling revenue, but loss shrinks
- Microsoft helps boost Android, iOS app performance with offline access