Security

RSS
Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • Slideshow

    8 ways physical security has evolved

    Posted January 21, 2014 - 2:11 pm

    Physical security has come a long way since the advent of the lock and key. But for all of its changes, the greatest aspect of the evolution of physical security is how it has begun to mesh with our digital world. Here are eight of the most significant developments that have occurred over time in the field of physical security.
  • Slideshow

    Quick look: Obama and the NSA morass

    Posted January 17, 2014 - 12:42 pm

    New rules will limit NSA data gathering, but is the NSA paying attention?
  • Slideshow

    10 common misconceptions about security professionals

    Posted January 14, 2014 - 5:22 pm

    When it comes to working in security, there are plenty of misconceptions in the public. Many can be blamed on Hollywood, business speculation, and pure imagination.
  • Slideshow

    The worst data breach incidents of 2013

    Posted January 10, 2014 - 12:25 pm

    These businesses and government agencies lost the most personal and financial records due to hackers or security mishaps last year.
  • Slideshow

    Sher-locked: 12 famous passwords used through the ages

    Posted January 8, 2014 - 3:34 pm

    Passwords seem like a recent thing, but they’ve been in use for a long time. Here are a dozen of the more memorable ones
  • Slideshow

    7 security mistakes people make with their mobile device

    Posted January 6, 2014 - 3:29 pm

    Mobile devices, especially smartphones, have ushered businesses into a new era of productivity and working on-the-go. But with those advances and added convenience comes a wealth of security blunders just waiting to happen. Here are some of the worst mistakes users can make with their mobile devices and how to avoid them.
  • Slideshow

    10 crazy tech predictions for 2014

    Posted January 3, 2014 - 12:40 pm

    NSA plots and locks, Google robots, all things drone -- what to expect this year in tech.
  • Slideshow

    Fallout from the 2013 Snowden leaks

    Posted December 19, 2013 - 3:27 pm

    15 ways the tech sector and lawmakers have reacted to the NSA's surveillance practices.
  • Slideshow

    The biggest Internet security challenges of 2013

    Posted December 11, 2013 - 2:04 pm

    From the attack on privacy and Cryptolocker to Eric Snowden and the NSA, it's been a challenging year.
  • Slideshow

    Best tools for mobile device management

    Posted December 9, 2013 - 4:10 pm

    Choosing between AirWatch, Apperian, BES 10, Divide, Fixmo and Good Technology depends on your priorities.
  • Slideshow

    5 risks to avoid for the holidays

    Posted December 6, 2013 - 12:38 pm

    'Tis the season for social engineering scammers who like to prey on shoppers. CSO spoke to Troy Gill of AppRiver, who outlines five risks that are particularly common during the holidays.
  • Slideshow

    Don’t click on these links

    Posted December 4, 2013 - 11:39 am

    How to stay one step ahead of phishing attacks
  • Slideshow

    15 FREE steganography apps for mobile devices

    Posted November 27, 2013 - 10:24 am

    Hide messages within innocent-looking photos and audio files from your phone or tablet.
  • Slideshow

    The NSA’s weird alphabet soup of code names for secret spy programs and hacker tools

    Posted November 26, 2013 - 4:40 pm

    Documents leaked by Edward Snowden to the media have revealed the sometimes strange code names.
  • Slideshow

    5 ways to lockdown your mobile device

    Posted November 26, 2013 - 10:11 am

    It may not be the strongest form of security, but it's a necessary first line of defense. Here are five ways to lock on various mobile platforms.
  • Slideshow

    10 mistakes companies make after a data breach

    Posted November 14, 2013 - 10:52 am

    Michael Bruemmer, vice president of Experian Data Breach Resolution, outlines some the common mistakes his firm has seen as organizations deal with the aftermath of a breach during a presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy.
  • Slideshow

    5 IT security horror stories (and 5 solutions)

    Posted October 22, 2013 - 9:44 am

    When it comes to security, your employees may be your weakest link. While policies and training can go a long way toward helping your employees keep devices and data safe, sometimes technology is the answer.
  • Slideshow

    5 steps for application security

    Posted October 18, 2013 - 10:44 am

    The software development lifecycle can be a double-edged sword. On one hand, software needs to be developed with usability in mind, and it needs to be produced quickly. On the other hand, it also needs to maintain a solid security base. Having those two sides in equal measure is easier said than done. Darren Meyer, Senior Security Researcher for Veracode, walks us through five steps for secure application development and deployment.
  • Slideshow

    Worst data breaches of 2013 (part 3!)

    Posted October 15, 2013 - 2:08 pm

    The Identity Theft Resource Center has recorded 450 data breaches so far this year, and here are the worst that become known between July and September.
  • Slideshow

    Quiz: What do you know about the NSA?

    Posted October 4, 2013 - 9:57 am

    They know everything about you but what do you know about them?
  • Slideshow

    7 ways to beat fingerprint biometrics

    Posted September 20, 2013 - 10:38 am

    Apple's embrace of finger scanning technology in the iPhone could be a breakthrough moment for biometrics. But finger scanners are no panacea. Here are 7 ways hackers have figured out to fool them.
  • Slideshow

    Best tools for protecting passwords

    Posted September 9, 2013 - 11:55 am

    Passwords are a security weak link, but these products help shield passwords from attackers.
  • Slideshow

    Quiz: Name that hacker

    Posted August 16, 2013 - 11:18 am

    After breaking into networks for fun, profit, and to fulfill political agendas, some did prison time.
  • Slideshow

    World-saving robots

    Posted August 12, 2013 - 3:18 pm

    These human-like robots could be the first responders to major disasters in the future
  • Slideshow

    Black Hat shows its quirky side

    Posted August 12, 2013 - 11:42 am

    From an Edward Snowden cutout to panties with a message the premier security conference has it all

Join today!

See more content
Ask a Question
randomness