data security

Latest Headlines

Latest Headlines

Choosing BYOD vs. CYOD? The path to both is secure data

Whether your organization is embracing a BYOD or a CYOD program, ulitmately what are most important are the steps you take to secure company data. Here are some steps on how to do just that.

Are you ready for a big data disaster? Here's how to prepare

Protecting company data has always been a difficult challenge, and with every passing day it becomes harder to do. As Mary-Pat Cormier says in her guest post today, "companies have become aware that the risk of being hacked is unavoidable." Fortunately, she has some very good advice to share on what to do to financially and legally protect your company before and after a breach.

Many IT security pros are sending sensitive data without encryption

Nearly 36 percent of IT security professionals admit to sending sensitive data outside of their organizations without using any form of encryption to protect it, a new survey from Voltage Security found. The survey showed that almost half of respondents are not de-identifying any data within their organizations.  

Data security--It's all about location

As data migrates across networks, borders and devices, focusing solely on the physical location of data is no longer relevant, argues market research firm Gartner.

Gartner: CISOs dropping the security ball on big data

Chief information security officers are dropping the ball when it comes to big data by not implementing a data-centric, comprehensive data security policy, says Brian Lowans, principal research analyst at Gartner.

BYOD success starts with employee training

A new BYOD survey finds that 100 percent of employees use open public Wi-Fi networks. That means some training is definitely called for to help employees better understand the risks that BYOD brings.

NSA failed at one thing, says former NSA director

Gen. Keith Alexander, who retired in March after eight years as the director of the NSA, said the NSA "faithfully did" its job but failed at one thing. Can you guess what that one thing was?  

Move to the cloud generates compliance worries for IT pros

As enterprises move more of their data to the cloud, they are increasingly concerned about regulatory compliance issues regarding that data, according to a survey 1,068 tech professionals by cloud portfolio management firm RightScale.

Heartbleed puts small businesses at greater risk

The Heartbleed bug, which is present in two-thirds of websites, is adding to the security risks of small businesses, the BBC reports.

LTE: The need for speed opens up security potholes

Mobile operators' deployment of high-speed 4G LTE networks has opened the door to security threats because of vulnerabilities inherent in the all IP architecture, warns Stephane Teral, principal analyst for mobile infrastructure and carrier economics at Infonetics Research