Security

Security | News, how-tos, features, reviews, and videos

IDG Tech Spotlight  >  Security  >  Balancing security and innovation

Security vs. innovation: IT's trickiest balancing act

An innovative initiative is only as successful as it is secure. Here’s how CIOs are balancing risk-taking with risk aversion.

IDG Tech Spotlight  >  Security  >  UEM/unified endpoint management and security

UEM to marry security — finally — after long courtship

Machine learning will be key in evaluating whether a mobile device and its user should be allowed to connect to a corporate application or data silo, as user behavior becomes a part of overall endpoint security.

cia triad security triangle glowing binary process by nolimit46 getty 2400x1600

The CIA triad: Definition, components and examples

The CIA (Confidentiality, Integrity, Availability) triad is a widely used information security model that can guide an organization's efforts and policies aimed at keeping its data secure.

Antivirus digital syringe and virus/biohazard symbol in binary matrix

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.

securitycamera hub image 2019
Updated

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

Abstract blockchain concept  >  Blocks / nodes / connections / transactions

U.S. Air Force to pilot blockchain-based database for data sharing

The blockchain ledger will enable data ingest from legacy data systems and wikis as well as a native web application build platform

A man with his head in his hands amid abstract security contruct.

Cisco patches a security glitch affecting routers, switches and phones

Cisco fixes vulnerabilities in its Cisco Discovery Protocol (CDP) that could let remote attackers take over products without any user interaction

cloud security / data protection / encryption / security transition

Infrastructure-as-code templates are the source of many cloud infrastructure weaknesses

A new report shows a high percentage of IaC template misconfigurations in cloud deployments that leave them vulnerable to attack.

Computerworld > Mobile voting via phone / digital ballot

Iowa Caucus chaos likely to set back mobile voting

While the app used to tally votes during the Iowa Caucus on Monday was not a mobile voting app, it could still undermine confidence in any future attempts to roll out the technology.

Google Photos

Google may have accidentally sent your private videos to some random person

Google has admitted that it accidentally distributed private videos to the wrong Google Photos users.

airologo

Airo Antivirus review: A promising start for a Mac-focused antivirus

A solid choice for Mac users, but not as full-featured as more established choices.

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.45 billion and counting.

Selecting the right people.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

avast free antivirus install screen

Update: Avast kills Jumpshot data-collection business after privacy concerns mount

A report alleged that Avast and AVG collected personal information and sent it Jumpshot, a subsidiary that provides information on every "search, click and buy" you make to corporate clients. In response, AVG killed Jumpshot.

7 must see discounts for samsung galaxy s10 norton 360 more 1

7 Must-See Discounts for Samsung Galaxy S10, Norton 360, & more

Find the top discounts and coupon codes on Alamo, Hotwire, MoneyGram, H&R Block, Norton, Samsung, and Avast available throughout February 2020.

fastestvpn2

FastestVPN review: A surprising upgrade for 2020

FastestVPN is a surprising little service. It's very affordable, makes the right privacy promises, and now works with Netflix.

Internet of Things (IoT) / security alert / wireless network management

Implementation flaws make LoRaWAN networks vulnerable to attack

New report from IOActive details implementation errors that expose LoRaWAN networks to attack and provides a framework for mitigating the risk.

Computerworld > Mobile voting via phone / digital ballot

Seattle tries out mobile voting

But voter skepticism about online security has some Washington state officials responsible for general elections wary of rolling out the tech.

online shopping cart magecart hackers shopping online

Magecart-related arrests made in Indonesia

The three individuals arrested represent only a small portion of the Magecart web-skimming group, but the investigation is ongoing.

cacheout logo

New 'CacheOut' attack targets Intel processors, with a fix arriving soon

Researchers claim that the latest side-channel exploit against Intel processors can be used to leak a targeted set of data, rather than just a random bunch of bytes.

Load More