Security

Security | News, how-tos, features, reviews, and videos

pc antivirus
login password - user permissions - administrative control

security trust

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

blockchain bitcoin circuitry global

Blockchain: What’s it good for? Absolutely nothing, report finds

Blockchain has entered Gartner's 'Trough of Disillusionment' as a new report cites dozens of purported success stories that turned out to be failures.

security internet network encryption privacy padlock

What is SSL, TLS? And why it’s time to upgrade to TLS 1.3

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

workplace distractions donuts crazy

10 of the coolest and wackiest tech stories of 2018

From quantum computing to smart drones, network security goofs and AI developments it has been an interesting year.

laptop analytics data scientist analytics process doctor electronic medical records remote physician

Amazon launches patient data-mining service to assist docs

Through its Amazon Web Services platform, Amazon is offering an A.I. engine that can cull useful information from millions of unstructured electronic files, including patient electronic medical records.

best home security cameras
Updated

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

Windows 10 devices

FAQ: Windows 10 LTSB explained

The 'Long-term Servicing Branch' of Windows 10 was initially aimed at enterprises that wanted to avoid Microsoft's Windows-as-a-service model and delay frequent feature updates. Here's how it's supposed to work.

Office 365 software boxes

Microsoft's multi-factor authentication service flakes out – again

For the second time in nine days, the Multi-Factor Authentication system used by Microsoft for Office 365 logins failed.

smart city iot digital transformation networking wireless city scape skyline

What will be hot for Cisco in 2019?

Software, SD-WAN, security, high-speed data-center networking, and more software fill up the Cisco hot plate for 2019.

#slack signage

10 Slack security tools compared

Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.

intro cyber attack maps

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

windows hello fingerprint

What is Windows Hello? Microsoft’s biometrics security system explained

Windows Hello gives Windows 10 users an alternative way to log into their devices and applications using a fingerprint, iris scan or facial recognition. Here’s what the technology does, who uses it and the hardware required.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

BlackBerry's acquisition of Cylance raises eyebrows in the security community

BlackBerry's move into the endpoint security game may create public safety issues, given the company's history with encryption backdoors, experts say.

ransomware breach hackers dark web

10 things you should know about dark web websites

Catch a glimpse of what flourishes in the shadows of the internet.

certificate

Google makes good on promise to remove some Symantec PKI certificates

If you get this digital certificate error using Chrome, then Google now considers that website's Symantec PKI certificate untrustworthy.

shipping containers

7 container security tools to lock down Docker and Kubernetes

These extra-strength tools bring monitoring, auditing, runtime defenses, and policy-based controls to containers in development and production

Mobile security

6 mobile security threats you should take seriously in 2019

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these issues in the coming year.

mobile security

ProtonMail launches standalone iOS VPN app

The encrypted email service provider, born out of CERN in Europe, has unveiled a VPN app for iOS devices.

Load More