Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands

group of millennials using mobile devices
patch

1 incident response police tape crime death

10 steps for a successful incident response plan

Incident response plans are often left unused, leaving firms far less able to detect and respond to cyber attacks or data breaches. Here’s our 10-point plan to ensure you set up -- or improve -- an IR plan that actually works.

SSL padlock icon security

It's time to upgrade to TLS 1.3 already, says CDN engineer

Businesses dragging their heels over rolling out TLS 1.2 on their website might have an excuse to delay a little longer: Version 1.3 of the TLS (Transport Layer Security) encryption protocol will be finalized later this year, and...

phishing cyber theft hacked scam

New social media scams: Can you tell friend from foe?

Scams on social networks are nothing new, but they're constantly changing to take advantage of the latest apps, trends and news. As with all social engineering scams, the best defense is a skeptical user.

How IT should prep for Apple's public OS betas

With the arrival of Apple's public betas of iOS 11 and macOS High Sierra, users will be downloading unfinished software to their computers and iDevices. Is your IT shop ready for the aftermath?

transporter effect

7 elements of a successful security awareness program

Action items for CSOs looking to bolster their security awareness programs.

security incident responder

What it takes to be a security incident responder

A wide range of technical skills and curiosity about the mechanics and goals of an attack are key for effective incidence response.

03 shipping malware
Update

How to remove malware from your Windows PC

Has a malware infection taken your PC hostage? Here's how to clean it out and restore your PC to a pristine state.

linux penguin security

5 things you need to know about Stack Clash to secure your shared Linux environment

Qualys shows that attackers can locally exploit the privilege escalation vulnerability to gain root access over Linux, Solaris and BSD machines. This is bad news for Unix-based servers, and even more so for multi-tenant environments.

blockchain ecosystem

4 ways blockchain is the new business collaboration tool

While the full potential of blockchain is often not understood by business execs, that's not keeping companies from aggressively exploring how the secure, distributed ledger technology can save time and money.

engie drone close up

EU wants to ease commercial drone use with future flight rules

The European Commission wants to make it easier for lightweight drones to fly autonomously in European airspace -- with logistics, inspection services and agricultural businesses set to benefit. Last Friday, the Commission...

Hacking stealing password data

Two years after the OPM data breach: What government agencies must do now

Recent reports show declining grades for government agencies’ efforts to improve cybersecurity. Experts weigh in on what needs to be done.

citizen developers

Your secure developer workstation solution is here, finally!

Developer workstations are high-value targets for hackers and often vulnerable. Now you can protect them using concepts borrowed from securing system admin workstations.

malware

With new dynamic capabilities, will whitelisting finally catch on?

In this age of destructive and fast-spreading malware, companies are giving whitelisting a second look -- and with cloud-based, peer-to-peer whitelists and reputation scoring, the technology now has a chance to be widely adopted.

Mobile security

Rogue cell phone surveillance gives rise to mobile threat defense

University of Washington researchers developed a system to detect cellular anomalies and pinpoint cell phone surveillance devices. The technology could be used to better protect enterprise users, especially when they're traveling.

021317blog software

How to stop wasting money on security shelfware

Investing in security tools that end-up on the shelf or underutilized is not inevitable, and it can be reduced or even eliminated by some proactive and surprisingly simple first steps.

23922465470 fe3c8b8cdf o
Update

The 15 worst data security breaches of the 21st Century

Security practitioners weigh in on the 15 worst data security breaches in recent memory.

Microsoft resurrects Windows XP patches for second month straight

Microsoft today followed May's unprecedented release of security updates for expired operating systems by issuing another dozen patches for the aged Windows XP.

cybersecurity skills and talent shortage

Why linguistics can't always identify cyber attackers' nationality

The security whodunnit: analyzing the language used in an attack is just one tool to assign attribution, and it’s not always reliable.

Load More