Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

Oracle headquarters
disaster recovery plan ts

The dark web goes corporate

It's just as shady and dangerous as ever, but something has changed in the way the dark web does business, and it will look very familiar to IT buyers.

construction building crane architecture

How to write an information security architect job description

A good information security architect straddles the business and technical worlds. Writing a solid, clear job description ensures that both sides understand the role.

Cloud Security

Top cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind...

hiring software developers

Four ways to use open data sources to find cybersecurity candidates

Publicly available data from government and other sources can help you find the right security talent.

Black Hat 2015

The best of Black Hat: The consequential, the controversial, the canceled

Over the past two decades, the annual Black Hat conference has had its share of controversy. CSO looks back at the most significant talks and demonstrations.

IBM Z mainframe

IBM wants you to encrypt everything with its new mainframe

IBM wants businesses to use its new z14 mainframe to encrypt pretty much everything -- an approach to security it calls pervasive encryption.

we're hiring sign jobs careers public domain

Six entry-level cybersecurity job seeker failings

More cybersecurity job openings mean more entry-level candidates are entering the market. These are the common mistakes they make when apply and interviewing for an opening.

thread weave colorful network web

What is IoT?

Our overview of the patchwork of technologies that makes up the Internet of Things, and the major issues facing IoT.

ransomware

Who is a target for ransomware attacks?

While any enterprise is a possible ransomware target, some are more likely than others to be caught in a cybercriminal’s crosshairs.

cybersecurity skills and talent shortage

Look beyond job boards to fill cybersecurity jobs

The cybersecurity staffing shortage is reaching crisis proportions, and companies are looking beyond the traditional channels of job boards and headhunters to find and hire new talent. Here are some of the unconventional ways...

cybersecurity skills and talent shortage

Why linguistics can't always identify cyber attackers' nationality

The security whodunnit: analyzing the language used in an attack is just one tool to assign attribution, and it’s not always reliable.

00 title awareness training

4 tips to make use of Wannacry in awareness programs

When security events make news, you can take advantage of the wake-up call — if you know what to do.

Computerworld - Mingis on Tech - video podcast teaser [3x2/1800x1200]

Mingis on Tech: The language of malware

When it comes to tracking down the bad actors behind malware and ransomware, cybersecurity firms are turning to linguists.

Mingis_on_Tech
video

Mingis on Tech: How linguistics can help catch cyberattackers

When it comes to tracking down the bad actors behind malware and ransomware, cybersecurity firms are turning to linguists.

csan 001 top 15 security breaches
video

The 15 worst data security breaches of the 21st century

Some of the largest companies in the U.S. have been targets of hackers, including Yahoo, JP Morgan Chase and TJX. Watch as we detail the top 15 breaches and their overall impact on customers or employees.

blockchain ecosystem

Linux group pushes out production-ready blockchain collaboration software

The Linux Foundation is touting availability of Fabric 1.0, a foundation for developing blockchain applications such as smart contracts.

Movie preview test pattern

Top security tools of 2017

From deception and endpoint security to cloud security and traffic analysis, we review some of the most innovative and useful security tools from today's most important cybersecurity technology categories.

Talent compass to recruit and hire the right skills.

How to write an information security analyst job description

A thorough, clear job description will ensure that security analysts stay on the same page with management expectations.

Load More