Security: Data Protection


Firm's Research Reveals 82 Percent of Public Cloud Databases Unencrypted

Research from RedLock Inc. reveals numerous security problems in public cloud environments, finding 82 percent of hosted databases remain unencrypted, among other multiple issues.

IBM Unveils New Mainframe for Secure, Hybrid Cloud Computing

IBM yesterday announced a new mainframe called the z13s that's optimized for security in hybrid cloud environments.

Study: Using Cloud Could Be Dangerous and Expensive

Survey shows IT and security pros wary of potentially expensive cloud data breaches.

Trend Micro Announces Enterprise Endpoint Sensor Protection

Trend Micro Inc. recently announced enhancements to its enterprise-wide security platform designed to provide a better unified threat defense against known attacks while also detecting and responding to new targeted attacks now in widespread use.

Making the Grade: 6 Data Protection Best Practices for Universities and Colleges

We explore the best practices that address the special needs of educational institutions.

IT Security: 2012 in Review, Predictions for 2013

The top trends security administrators dealt with in 2012 and what's ahead in 2013.

Q&A: Making File Transfers and Sharing More Secure

Is FTP losing out to file-sharing cloud services?

Keyloggers: The Most Dangerous Security Risk in Your Enterprise

How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise.

More Tips for Next-Generation Firewalls: Security Policy Management

We examine policy considerations and how to manage security policy in a mixed environment.

3 Tips for Next-Generation Firewalls: Sizing and Deployment

Before you implement a next-generation firewall, follow these three tips to ensure project success.

5 Rules for Reining in Key Sprawl

Following these five rules will help your organization get your security keys under control.

Q&A: User Authentication Challenges, Best Practices, and the Future

Usernames and passwords are no longer enough to secure your data. We explore the benefits and costs of more advanced end-user authentication.

Q&A: Securing Data in the Cloud

Data is flowing as never before to the cloud, increasing enterprise data risks. We examine the security issues and best practices for keeping your data safe in the cloud.

A CxO’s Guide to Understanding Today’s Most Dangerous Attacks

To understand how to counter stealth malware threats, you first need to understand the nature and sophistication of these attacks at each of their four stages.

IAI: Big Data Analytics for Data Security

IAI is a new approach to the problem of identifying unauthorized user behavior that augments other types of security products and processes. Here's how it works.

The CCO’s Dirty Little Secret

A look at the true cost of compliance failures and how to avoid being buried in trouble.

An Introduction to Deep Content Inspection

Traditional deep packet inspection may no longer be able to protect your environment. We look at a new approach -- deep content inspection.

Tackling Today's Firewall Management Issues

Thanks to the ubiquity of firewalls, security administrators have no shortage of options and solutions. We examine the state of firewall management in today's data center.

Q&A: Why Big Data Security in the Cloud is No Small Matter

Big data and cloud computing are two top-of-mind technologies. What benefits can IT enjoy by bringing them together?

New Regulations Bring Advancements in Data Governance

As critical unstructured data grows exponentially amid a variety of data privacy laws, organizations are turning to data governance automation.