data protection

Data backup is no longer just about operational fallback
Data backup has traditionally been in the operational domain of IT, while security teams have been responsible for threats to data from attacks. As these attacks have become …

Cybercriminals create new methods to evade legacy DDoS defenses
The number of DDoS attacks we see around the globe is on the rise, and that trend is likely to continue throughout 2023, according to Corero. We expect to see attackers deploy …

3 important changes in how data will be used and treated
Regula has presented their vision of the developments that will shape the industry’s landscape in 2023. Deepfakes, new cyber-hygiene norms, and demand for mature ID …

Electronics repair technicians snoop on your data
When your computer or smartphone needs repairing, can you trust repair technicians not to access or steal your personal data? According to the results of a recent research by …

Does your company need secure enclaves? Five questions to ask your CISO
Some of the biggest barriers to cloud adoption are security concerns: data loss or leakage, and the associated legal and regulatory concerns with storing and processing data …

What consumers expect from organizations that handle their personal data
In this Help Net Security video, Robert Waitman, Privacy Director and Head of Privacy Research Program at Cisco, discusses the key findings of Cisco’s 2022 Consumer …

Purpose-based access control: Putting data access requests into context
Access control is the heart of data protection. Striking the right balance between easy access and tight security isn’t easy, but getting it right is how you maintain business …

How serious are organizations about their data sovereignty strategies?
Scality announced the results of an independent survey of IT decision makers across France, Germany, the UK, and the US about their data sovereignty strategies. 98% of …

Better than a fix: Tightening backup and restore helps financial services companies innovate
We all know the risks out there. Ransomware is a huge threat, and critical transactional data is constantly under attack. Meanwhile, financial services organizations are being …

Browser synchronization abuse: Bookmarks as a covert data exfiltration channel
Two universal and seemingly innocuous browser features – the ability to create bookmarks (aka “favorites”) and browser synchronization – make …

Moving toward a more adaptable and tech-driven compliance function
A growing global regulatory focus on consumer privacy and data protection, along with new sustainability measurement and reporting laws is furthering the importance of …

How to navigate GDPR complexity
There’s been a lot of turbulence in the data privacy regulation space in the past couple of years. Post Brexit, there was a risk for the UK to be digitally isolated from …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility