Security

Security | News, how-tos, features, reviews, and videos

yubikey bio windows

How YubiKey Bio could make remote security concerns a thing of the past

Yubico will soon be launching its first biometric-powered security key, and in our new work-from-home world, it could be the way of the future.

200317 blue adt 19crop

ADT Blue Indoor Camera review: Watches for intruders, listens for alarms

The Blue Indoor Camera is a DIY home-security cam from ADT that will alert you should it hear a CO2 or smoke alarm going off.

Slack logo / security / network

10 Slack security tools compared

Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.

yubikey5nfc

Get three YubiKeys for the price of 2 in Yubico's World Backup Day sale

For World Backup Day, Yubico is offering a free YubiKey 5 NFC when you buy any two YubiKey 5 keys.

A vast network of identity avatars. [identity management]

10 identity management metrics that matter

Monitoring these key identity and access management numbers will help you evaluate the performance of your IAM solution.

norton2019 1

Protect up to five PCs at home with 50% off Norton 360 Deluxe today

Protect up to five devices with Norton 360 Deluxe for just $25 today at Amazon today.

vpn online

The Best VPN and Online Security in March 2020

Stay protected with VPNs and online security products offered by Norton and LifeLock.

Malicious USB dongle / memory stick / thumb drive with skull icon

Cybercriminal group mails malicious USB dongles to targeted companies

Shown as a proof-of-concept in 2014, this is the first known use of the BadUSB exploit in the wild.

Selecting the right people.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

protection privacy locks security cybersecurity

Google Smart Lock: The complete guide

Google Smart Lock can simplify your smartphone's security and save you time. Are you taking advantage of all it has to offer for Android?

laptop keyboard with a life preserver or personal floatation device [PFD]

Microsoft to stop serving non-security monthly updates to Windows

The updates, normally released during the third and fourth week of each month, will stop in May.

A binary map of china.

Chinese hacker group APT41 uses recent exploits to target companies worldwide

APT41 has compromised devices and applications from Cisco, Citrix and Zoho across many industries worldwide at a time when many companies are less able to respond.

A Microsoft update gets ready on a screen also displaying a COVID-19 coronavirus visualization.

Securing Windows and Office in a time of COVID-19: update policies, remote options

Delayed updates and a rush to support remote workers have forced IT and security teams to scramble. This information and advice will help them better deal with the crisis.

A businesswoman wears a protective mask in an office.  >  protection from viruses/pollutants/toxins

4 steps to build redundancy into your security team

A biological virus infecting your critical security staff could wreak havoc on your business. These practices will reduce your risk.

Social engineering  >  Laptop user with horns manipulates many social media accounts

Virtual security conferences fill void left by canceled face-to-face events

Notable members of the infosec community are creating impromptu but highly popular virtual events using cheap, off-the-shelf tools.

Statue of Lliberty as a digital framework / New York / binary code

New York's SHIELD Act could change companies’ security practices nationwide

SHIELD Act provisions broaden the scope of consumer privacy and place requirement on protecting personal data for organizations that collect information on New York residents.

Zero-trust / COVID-19 / pandemic

COVID-19 offers a unique opportunity to pilot zero trust, rapidly and at scale

A zero-trust model addresses many of the security concerns around supporting large numbers of remote workers, and new vendor free trials make fast deployment possible.

lock circuit board bullet hole computer security breach

The 14 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

Someone crouches, head in hands. / fear / stress / debilitation / weakness / exhaustion / fatigue

Cisco warns of five SD-WAN security weaknesses

Cisco has issued five – three on the high-end of the vulnerability scale – warnings about security weaknesses in its SD-WAN offerings.

coronavirus remote worker work from home romolotavani getty

6 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.

Load More