Security

Security | News, how-tos, features, reviews, and videos

pc antivirus
login password - user permissions - administrative control

security trust

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

binary cyberattack cybersecurity hacked protected

Online security tools: The holiday gift that shows you really care

With website breeches happenings at a blistering pace and people creating more and more online accounts, giving the gift of security can save a lot of headaches.

blockchain bitcoin circuitry global

Blockchain: What’s it good for? Absolutely nothing, report finds

Blockchain has entered Gartner's 'Trough of Disillusionment' as a new report cites dozens of purported success stories that turned out to be failures.

security internet network encryption privacy padlock

What is SSL, TLS? And why it’s time to upgrade to TLS 1.3

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

hacking cybersecurity padlock motherboard

Quora data breach FAQ: What 100 million hacked users need to know

Hackers have stolen information about 100 million Quora users. Here's what they took and what you need to do next.

marriott breach

Marriott Starwood hotel data breach FAQ: What 500 million hacked guests need to know

Marriott has announced a database breach affecting some 500 million of its customers. Here's everything you need to know.

lockly 2

Lockly Secure Plus Review: Biometrics comes to the smart lock

You can open this smart lock with a PIN or your uniquely identifiable fingerprint.

workplace distractions donuts crazy

10 of the coolest and wackiest tech stories of 2018

From quantum computing to smart drones, network security goofs and AI developments it has been an interesting year.

laptop analytics data scientist analytics process doctor electronic medical records remote physician

Amazon launches patient data-mining service to assist docs

Through its Amazon Web Services platform, Amazon is offering an A.I. engine that can cull useful information from millions of unstructured electronic files, including patient electronic medical records.

ivacybig
Updated

Ivacy VPN review: A competent VPN that doesn't mind cryptocurrencies

Ivacy offers average speeds, a cleanly designed app, and a few helpful features like split tunneling, but it's also a company that doesn't want to reveal who's running the show.

best home security cameras
Updated

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

Windows 10 devices

FAQ: Windows 10 LTSB explained

The 'Long-term Servicing Branch' of Windows 10 was initially aimed at enterprises that wanted to avoid Microsoft's Windows-as-a-service model and delay frequent feature updates. Here's how it's supposed to work.

kangaroo sensor 1

Kangaroo Motion Sensor review: This home security system only goes halfway

This home security system sure sounds inexpensive, but it's no bargain.

hideipvpnninja
Updated

HideIPVPN review: Great if you need a speedy connection via Germany

HideIPVPN is easy to use, but its performance leaves a lot to be desired.

Office 365 software boxes

Microsoft's multi-factor authentication service flakes out – again

For the second time in nine days, the Multi-Factor Authentication system used by Microsoft for Office 365 logins failed.

smart city iot digital transformation networking wireless city scape skyline

What will be hot for Cisco in 2019?

Software, SD-WAN, security, high-speed data-center networking, and more software fill up the Cisco hot plate for 2019.

#slack signage

10 Slack security tools compared

Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS protection, mitigation and defense: 8 essential tips

Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.

Load More