Quantcast
Channel: Computerworld - data security RSS feed
Browsing latest articles
Browse All 97 View Live

Network security needs big data

There are two types of organization now: those that have been breached, and those that just don't know it yet.

View Article



OK, BlackBerry, what else have you got besides security?

BlackBerry's pitch to get back into the warm embrace of corporate IT shops seems logical enough at first glance: We're the most secure in mobile. Mobile is where all of your data and interactions are...

View Article

Making a hash of passwords

Last week, I went to a project meeting so I could provide security insights as some consulting software developers updated us on the customer-facing application they're building for us. But I was...

View Article

Taking a gander at the security landscape

Looking around at how things are done at my new company, it's pretty easy for me to find security problems lurking virtually everywhere.

View Article

The Sony breach may be start of new nation-state cyberattack

It has been an exceptional year for IT security breaches, which have become part of an escalating trend in destructive attacks. And they're going to get worse.

View Article


Protect yourself from hackers and the NSA

The downside of email, chat, text and messaging apps is that they make you feel like you're communicating privately, with only the intended recipients. And that your messages are private. Until they're...

View Article

More than 1 billion records breached in 2014

In IT security, worst case scenarios became commonplace in 2014, and there's no end in sight. Headline-making data breaches will likely continue into this year, as businesses, governments and...

View Article

Don't get into an email mess

Though she may have broken no laws, Hillary Clinton acted irresponsibly in using a personal email account to conduct official U.S. government business in her capacity as secretary of State.

View Article


Where's the data?

It's a time-honored tradition: U.S. businesses find ways to skirt inconvenient or expensive laws by moving operations to other countries. Thus we have had U.S. corporations operating overseas to...

View Article


Sony reminds us all what a pathetically weak link email is

Sony is reliving the nightmare that its hacked databases gave rise to late last year, now that Wikileaks has thoughtfully published all of the leaked documents in a searchable database. Really, they...

View Article

Applying the Irari Rules to a risk-based security program

The feedback from our last article, in which we laid out what we call the Irari Rules for classifying a cyberattack as "sophisticated," was overwhelmingly positive. Nonetheless, a few people we respect...

View Article

OPM: The worst hack of all time

Hi, my name is Steven J. Vaughan-Nichols and I had a security clearance in the 1980s. Because of that, my personal records are likely to have been revealed by the Office of Personnel Management hack.

View Article

Data silos create challenges for IT managers

Security risks created by data silos is cited as a top challenge by 34 per cent of Australian and New Zealand IT managers according to an IDC survey.

View Article


Can off-the-shelf network storage do the job I need?

It’s a big question: Is it better to buy off-the-shelf network storage, or build your own? The latest drives available at stores such as JB Hi-Fi highlight how dependable, and cost-effective, buying...

View Article

​Meeting the ongoing challenge with security and IoT

As both business and consumers show a rapidly growing interest in the Internet of Things (IoT), the lax security standards in some of these devices is coming under renewed focus.

View Article

Browsing latest articles
Browse All 97 View Live




Latest Images