Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

ransomware wannacry
anthony grieco

intro

New products of the week 5.22.17

Network World's final edition of its long-running highlight of the latest and greatest products in the tech sector.

veterans fill cybersecurity gap2

Companies ramp up recruiting veterans as cybersecurity urgency grows

Many veterans have the cybersecurity skills and attitude to be successful in the public sector with the right support.

wannacry ransom screenshot

The ransomware epidemic: How to prep for a shakedown

In the wake of the WannaCry ransomware attacks, Dan Larson, technical director at CrowdStrike, offers advice on why organizations should take threats seriously and how to build a strong defense.

The modern guide to staying safe online

The modern guide to staying safe online

Keeping safe and productive online requires smart decision-making and just the right preventive measures to fit the level of risk you can live with.

ryan benson

A day in the life of a threat researcher

After leaving Exabeam at the end of the workday, Ryan Benson’s mind doesn’t shut off when it comes to thinking about designing new defenses against Black Hats. See what his day looks like.

vint cerf large 100282166 orig

CW@50: Vint Cerf on his 'love affair' with tech and what’s coming next

In an interview marking Computerworld's first 50 years of covering the tech industry, internet pioneer Vint Cerf looks back at the last half century in tech and ponders what's ahead for IT.

patching against ransomware

WannaCry reminds CIOs to stay on top of patching

Cybersecurity experts say delaying or even ignoring a patch Microsoft released two months ago paved the way for the current ransomware. So why don’t CIOs keep on top of patching?

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

pc antivirus

Yes, you still need endpoint malware protection

While operating systems and apps are more secure, the need for endpoint security remains.

panda security

55% off Panda Security Ransomware and Virus Protection Products for Home Users - Deal Alert

Panda security solutions will fully protect you against the newly released malware and ransomware attacks, and Panda is offering 55% off all security products for home users using this special code at checkout.

shadowy attacker hooded (public domain)

How to maintain data oversight to avoid ‘shadow data’

As more companies take a liberal approach to cloud app provisioning, they need to make sure that all apps – including vetted ones – are carefully secured, optimized and monitored. Al Sargent, senior director at OneLogin, offers the...

trojan horse virus

Blackmoon banking trojan returns with new framework

Fidelis Cybersecurity describes the new way Blackmoon was delivered to South Korean financial institutions and offers advice for preventing future attacks.

tatu ylonen

Unmanaged, orphaned SSH keys remain a serious enterprise risk

There are many ways attackers can try to infiltrate an enterprise, but many times enterprises make it so easy that the attackers don’t have to try too hard. Consider the current state of orphan SSH (Secure Shell) keys and how...

3 keychain keys

Outsourcing security: Would you turn over the keys to a third party?

Years ago it would have been unthinkable to give up control to securing your most valuable assets. But for some companies the risk of handing the security keys to a third party is less than the idea of facing the daily barrage of...

hacker, hackers, hacking

Shadow Brokers teases more Windows exploits and cyberespionage data

A group of hackers that previously leaked alleged NSA exploits claims to have even more attack tools, as well as intelligence gathered by the agency on foreign banks and ballistic missile programs.

privacy

Missing protection: Corporate B2B privacy policies

The general lack of such policies is a major security hole.

04 ddos

Cybercrooks fight over DDoS attack resources

As more groups get into the denial-of-service attack business they're starting to get in each other's way, according to a report released this morning. That translates into a smaller average attack size.

microphone interview voice reporter

Vocal theft on the horizon

Voice imitation technology has the potential to undermine yet another form of biometric authentication. Security experts say the key is to make sure the individual voice information is stored on the user’s device, not in a centralized...

Load More