Data and Information Security

Data and Information Security | News, how-tos, features, reviews, and videos

A protected padlock with checkmark amid a field of abstract data.
A magnifying lens examines top secret information amid binary code.

Encryption  >  A conceptual technological lock and encrypted code.

Is everything you thought you'd done right for security about to be at risk?

It may still be early days for quantum computing, but there has been significant progress recently. But what does that mean for today’s 'unbreakable' encrypted data?

data science certification man at computer

14 IT certifications that will survive and thrive in the pandemic

These tech certifications not only have high value now, but employers will continue to value them as the coronavirus continues.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself.

Encryption  >  Encrypted data / hexadecimal code

How close are we to breaking encryption with quantum computing?

Not as close as you might fear, but quantum encryption cracking is on its way. So, it's time to start getting ready for it.

Encrypted blocks of multicolored data cubes rolling out.

Has the quantum crypto break already happened?

Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe.

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

business decision making 166291792

Developing an information security decision-making matrix

It is possible to create a simple, bright-line means of triaging engagements to determine whether heightened security and privacy measures should be required.

Android Notifications

Moving beyond template-based notifications

How to identify your gray area stakeholders for more effective incident response communications.

decayed weathered distressed texture security weakened vulnverable

Protecting the digital economy

Our tech-addicted society has become much more vulnerable to cyberattacks, requiring CEOs to put security at the forefront of their agenda.

money financial salary growth currency by davidleshem

5 cybersecurity jobs with the highest salaries in 2019

Why cybersecurity is one of the highest paid specialization areas in tech…and the five highest paid cybersecurity roles for 2019.

Load More