Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

China app store
Samsung SmartCam snh 1011

gavel court trial

Cisco calls on Arista to stop selling products in US after agency reverses patent finding

The U.S. Customs and Border Protection (CBP) agency has revoked its November 2016 finding that Arista’s redesigned products don’t infringe a key Cisco patent -- as a result Cisco called on Arista to stop importing those products and...

cybersecurity

Digital transformation forces businesses to rethink cybersecurity

Enterprises are increasingly bringing together security professionals with operations teams and developers.

01 detection

When real-time threat detection is essential

There are times when an organization will be especially vulnerable if they don’t have real-time detection capabilities, and in preparation for these events it’s a good idea to reevaluate tools and strategies. Mike Paquette, director...

intro

New products of the week 1.16.17

Our roundup of intriguing new products from companies such as Apptio and Viavi Solutions.

microsoft stock campus building

Microsoft slates end to security bulletins in February

Microsoft in February will stop issuing the detailed security bulletins that for nearly 20 years have provided information about vulnerabilities and patches.

WhatsApp (1)
Update

WhatsApp vulnerability could expose messages to prying eyes, report claims

A vulnerability in the popular messaging service WhatsApp could allow Facebook to read supposedly encrypted messages.

Small businesses are prime targets for cyber attacks: SIEM-as-a-service can help

Netsurion’s SIEM-at-the-Edge puts enterprise-level detection and response capabilities in the hands of SMBs

security code big data cyberespionage byte

After MongoDB, ransomware groups hit exposed Elasticsearch clusters

After deleting data from thousands of publicly accessible MongoDB databases, ransomware groups have started doing the same with Elasticsearch clusters that are accessible from the Internet and are not properly secured.

NSA headquarters

Suspected NSA tool hackers dump more cyberweapons in farewell

The hacking group that stole cyberweapons suspected to be from the U.S. National Security Agency is signing off -- but not before releasing another arsenal of tools that appear designed to spy on Windows systems.

hacker, hack, hacking

Guccifer 2.0, alleged Russian cyberspy, returns to deride US

As if the whodunnit into the hacking of the Democratic National Committee wasn't already confusing and murky enough, the supposed Romanian hacker who first released the emails resurfaced on Thursday to say everyone has it wrong.

hacker, hack, hacking

Siblings arrested in Italy's worst cyberespionage operation ever

The Tuesday arrest of Giulio Occhionero and his sister, Francesca Maria, has brought to light what appears to be the biggest, and highest-profile, hacking of institutional and corporate accounts ever reported in Italy.

video

Security Sessions: Will security budgets go up in 2017?

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with CSO Publisher Bob Bragdon about recent research around IT budgets, and how much of the budgets are allocated towards security. They also discuss...

godaddy office

GoDaddy revokes nearly 9,000 SSL certificates issued without proper validation

GoDaddy, one of the world's largest domain registrars and certificate authorities, revoked almost 9,000 SSL certificates this week after it learned that its domain validation system has had a serious bug for the past five months.

security camera attack surveillance

Trump's CIA nominee grilled on his advocacy of surveillance database

President-elect Donald Trump's nominee to head the CIA wants to create a massive surveillance database by resurrecting a U.S. telephone records collection program, but some senators questioned what limits he would accept.

microsoft keyboard

43% off Microsoft Wireless Desktop 900 Keyboard and Mouse Bundle - Deal Alert

The Wireless Desktop 900 keyboard has quiet-touch keys, and the full-size ambidextrous mouse provides comfortable, precise navigation. The Wireless Desktop 900 also includes Advanced Encryption Standard to help protect your...

cyberthreat cyber threat ts

Trump’s DHS pick urges more coordination on cyberthreats

As the Trump transition team – including the president-elect himself -- warms to the intelligence community's assessment on Russian election hacking, Homeland Security nominee looks to build bridge with IT industry to fight...

00 titel cost

How much is a data breach going to cost you?

A recent IBM study found that the average cost of a data breach has hit $4 million—up from $3.8 million in 2015. There are countless factors that could affect the cost of a data breach in your organization, and it’s virtually...

boardroom presentation

Bringing boards up to cyber speed

The exponential growth of cyber risk has impacted roles for the CISO and the CEO, among others, but it has also left board members a little in the dark when it comes to understanding the risks associated with cybersecurity.

Load More