Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

blockchain ecosystem

Blockchain integration turns ERP into a collaboration platform

Several big vendors are working to place blockchain's distributed ledger technology next to ERP systems so trusted entities can share data on everything from shipping manifests and supply chains to equipment maintenance and...

risky business cmo cio

CEOs' risky behaviors compromise security

If shadow IT is a problem with business decision makers, that may be a sign your senior security person isn't engaged at a high enough level.

shell game primary

Be wary of vendors touting superior data science

Security vendors are jumping on the data science, machine learning, AI bandwagon, but don't believe the hype. Here's how to make sure the vendor you're evaluating can make good on its promises of data science prowess.

trend arrow up calendar

Don’t like Mondays? Neither do attackers

You can reduce potential damage by paying attention to when attackers are most likely to strike.

man standing out crowd individual

Crowdsourcing application security closes the automated assessment gap

Crowdsourced pen tests aren't for everyone, but for one SaaS provider they help identify software flaws that automated tools may miss.

Network Networking Ethernet

What Extreme’s string of networking acquisitions means for enterprises

Extreme has recently bought Avaya and Brocade networking technology and Zebra Wireless

black white hat

How computer security pros hack the hackers

If you want to meet a really smart hacker, talk to a cybersecurity defender. These talented professionals are working every day to make cybercrime harder and less lucrative.

MWC HP HPE booth sign

HPE highlights innovation in software-defined IT, security at Discover

At its Discover conference this week, HPE is pulling back the curtains on firmware security and advances in software-defined IT aimed to reduce costs and increase system flexibility for its users and help it stay ahead of competitors...

CISOs

How and why to hire a CISO

If you haven't yet hired a chief information security officer, you're not alone. Here are the considerations for creating the position and making the hire.

cowboy shootout

Hack Back law would create cyber vigilantes

The Active Cyber Defense Certainty Act revision demonstrates what happens when you rely upon limited information and a cowboy mentality.

Gmail Google Mail

Google uses machine learning for new security features in Gmail

Google has pushed four new security features to enterprise users on G Suite, the search giant's hosted business offering. The new protections come shortly after Citizen Lab report exposed a Russia-linked Phishing and disinformation...

target ciso primary

Target's data breach settlement sets a low bar for industry security standards

Target’s multistate data breach settlement over its 2013 data breach outlines the kind of security measures enterprises should have in order to not be found negligent with customer data. The problem is, the settlement doesn’t go far...

patching against ransomware

How Cisco combats fast-maturing cybercrime networks

As Steve Martino approaches his 10-year anniversary as vice president and CISO at Cisco Systems, his job has morphed from treating security as simply a must-have to it becoming a strategic imperative for the company.

Internet of Things hack security smart home

6 reasons chip hacks will become more popular

Code embedded in hardware has vulnerabilities and it's harder to patch. That will make it a target for hackers.

Hacked, unlocked, unsafe.

Caught in the breach – what to do first

Since there is no way to prevent every cyber attack, incident response is crucial. Experts at the MIT Sloan CIO Symposium talk about what to do immediately after the bad news hits.

code programming software bugs cybersecurity

Patch the Samba bug before a network worm exploits it

It isn’t at WannaCry-crisis levels yet, but the fact that Samba is so widely used means a network worm can really have a field day exploiting this vulnerability.

artificial intelligence in the workplace

AI: The promise and the peril

Two panels at the MIT Sloan CIO Symposium this week focused on how to embrace the almost magical productivity benefits of artificial intelligence without leaving workers behind.

cybersecurity budgets

Cybersecurity ROI: Still a tough sell

Cybersecurity is a wise investment. But as a panel of experts at the MIT Sloan CIO Symposium said, it is difficult to put an exact number on it.

03 bounty hunter

10 things threat hunters watch for

Pursuing cyber threats is much like conventional hunting in that it requires patience, persistence and a keen eye, and when done correctly, it can be both exhilarating and rewarding. Threat actors do everything in their power to blend...

maze lost question direction wayward

5 common ways businesses lose valuable data

David Zimmerman, CEO and Founder of LC Technology, lists five ways individual employees and IT are causing companies to lose data, and some best practices for preventing a crippling data loss.

Load More