Menu

data protection - News, Features, and Slideshows

Features

  • Cyber extortion: A growth industry

    The prevailing wisdom in law enforcement has been that it is a bad idea to negotiate with extortionists. Cave to their demands and all you're doing is encouraging more extortion. And you don't even have a guarantee that paying a ransom will produce the return of your loved one unharmed, or your stolen assets.

    Written by Taylor Armerding18 April 15 00:48
  • 3 low-tech threats that lead to high-profile breaches

    In an age where data security defenses are getting more and more sophisticated, there will be increased pressure for malicious parties to glean information from within the organization's walls or public places.

    Written by Larry Ponemon17 Dec. 14 05:57
  • The future of security: 11 predictions for 2015

    As natural philosopher and onetime baseball catcher Yogi Berra reportedly said: "It's tough to make predictions, especially about the future."

    Written by Taylor Armerding16 Dec. 14 03:30
  • Kicking the stool out from under the cybercrime economy

    Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. Cripple the automated processes presented by certain malware platforms, and suddenly the threats -- and the losses --aren't quite so serious.

    Written by Grant Hatchimonji20 Aug. 14 02:54
  • Why your online identity can never really be erased

    One seemingly unshakeable truth about the online world since it began is this: The Internet never forgets. Once you post anything online, it is recoverable forever -- the claims of former IRS official Lois Lerner about "lost" emails notwithstanding. Even promises of photos disappearing after a few seconds have been shown to be bogus.

    Written by Taylor Armerding05 Aug. 14 05:37
  • The use of mobile credentials is on the rise, but can they be secured?

    Given the current prevalence of mobile devices, especially smartphones, it comes as no surprise that they are becoming more and more entwined with everyday aspects of our lives. We don't just use them to make calls, to text, or to browse the internet anymore. We can use them to do just about anything, and that includes using them as a means to provide our credentials.

    Written by Grant Hatchimonji03 June 14 05:05
  • 'HoneyDocs' lays irresistible bait for hackers

    Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.

    Written by Jeremy Kirk17 Sept. 13 12:01
  • It's the Information, Stupid

    Over the past several years there have been changes in the business environment, causing fundamental alterations in how security organizations operate to protect the enterprises for which they have responsibility.

    Written by Jason Stradley04 June 09 03:23