Security

Security | News, how-tos, features, reviews, and videos

nordvpn
Application security  >  Software code + data protected with a lock

nordvpnlogo
Updated

NordVPN review: A great choice for Netflix fans, but who's running the show?

NordVPN has good performance, great features, and suits novices and power users alike. But who is running the show down there?

Insider threats  >  Employees suspiciously peering over cubicle walls

Twitter spy scandal a wake-up call for companies to clean up their data access acts

Two Twitter employees accessed user data on behalf of the Saudi government. Neither should have had access, and this is a sign of a bigger problem at all companies.

browser security

How to lock down enterprise web browsers

Your organization's web browser is essentially your operating system for the cloud. Secure it appropriately.

hotspotshield

Hotspot Shield 2020 review: New owners, fantastic speeds, slightly better privacy

Hotspot Shield is still the speediest VPN we've seen, but the privacy policy could be better.

product 31280 product shots1

Windscribe VPN is offering Black Friday pricing on their subscriptions right now

Choose between four different subscription packages depending on your individual needs.

Skull-and-crossbones, code and the 'stop' gesture: hand held forward, palm out, fingers pointing up

How EDR stops hackers in their tracks

EDR is a category of security tools that monitor end-user hardware devices across a network for a range of suspicious activities and behavior, reacting automatically to block perceived threats and saving forensic data for further...

partnership / teamwork / handshake

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

google play protect

With the App Defense Alliance, Google Play Protect might actually keep malware off your phone

Google has announced a new alliance to augment its inadequate Play Protect malware detection system.

password boss logo

Password Boss review: Managing your passwords with authority

This app-only password manager makes it easy to keep your login credentials strong and safe.

CSO  >  Android antivirus conceptual image

Best Android antivirus? The top 9 tools

There are plenty of antivirus tools for Android. Here's how the top nine measure up in protection, usability and features.

Detecting phishing attempts  >  A magnifying lens spots a hook trying to catch a fish.

Defenders can discover phishing sites through web analytics IDs

Many phishing websites are now using unique user IDs (UIDs), and that gives defenders a signal to detect phishing attacks before they do much damage.

cisco

Cisco Meraki ups security with new switch, software

Cisco is bringing some of the bells and whistles of it Catalyst environment to Meraki customers with hardware and software to help customers better support and secure distributed network resources.

mobile security / unlocked data connections

Microsoft Intune can now block unauthorized BYOD hardware

Microsoft's decision to integrate third-party mobile threat defense software is a sign of bigger things to come for the company's UEM platform.

keeping the cloud secure cloud security lock padlock private cloud

VMware amps security with in-house, Carbon Black technology

VMware's Carbon Black platform, along with VMware NSX, VMware Workspace ONE, VMware Secure State and future innovations, will deliver built-in security to networks, endpoints, workloads, identity\ies, cloud and analytics.

Fragmented image of a Boeing 787 airplane represented in encrypted data.

Boeing's poor information security posture threatens passenger safety, national security, researcher says

The aircraft maker failed to perform minimum due diligence in securing its networks, then tried to cover it up, security researcher Chris Kubecka tells Aviation Cyber Security conference attendees.

Unified Endpoint Management

Do you really need a Chief Mobility Officer? (Spoiler alert: nope)

While C-level positions were all the rage when mobility was new in the enterprise, the role of CMO – while still somewhat prevalent – is now largely unnecessary and could even hurt your bottom line.

The United States Constitution and Bill of RIghts with lock and encryption overlay.

US Department of Justice push for encryption backdoors might run afoul of First Amendment

Is encryption code speech? Earlier court rulings suggest that it is, legally, and therefore subject to First Amendment protections.

kaspersky mac

Kaspersky Internet Security 2020: Top notch security at a good price

Kaspersky security has always been good, and with Internet Security 2020 we get top protection with some extra privacy features.

Load More