Security

Security | News, how-tos, features, reviews, and videos

compromised data / security breach / vulnerability
man in boat surrounded by sharks risk fear decision attack threat by peshkova getty

mobile device management

Google, Hyperledger launch online identity management tools

The new tools enable mobile-based options for employees to sign into corporate applications or create self-sovereign identities, access to which they control.

broken chain metal link breach security

Gov’t warns on VPN security bug in Cisco, Palo Alto, F5, Pulse software

VPN packages from Cisco, Palo Alto, F5 and Pulse may improperly secure tokens and cookies, allowing nefarious actors an opening to invade and take control over an end user’s system.

big brother privacy eye data breach security binary valerybrozhinsky getty

FEMA contractor at center of privacy violation provides services to many other agencies

Corporate Lodging Consultants provides lodging services to many other government agencies. Is more sensitive personal information at risk?

best home security cameras
Updated

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

6 industrial iot oil rig oil drilling cranes

Group behind TRITON industrial sabotage malware made more victims

The attackers stayed undetected on the victim's network for more than a year and sought out operational technology networks.

qpahy9p 4

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features.

qpahy9p 6

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features.

qpahy9p 7

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features.

qpahy9p 4

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features.

qpahy9p 2

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features.

google cloud services

Google expands cloud security capabilities, including simpler configuration

New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications.

security threats and vulnerabilities

New TajMahal APT discovered by Kaspersky has one known victim, likely others

Active since August 2014 with 80 modules able to capture a variety of information but with only one known victim, the TajMahal APT seems too advanced not to be used just once.

deepfakes fake news tv head manipulation superimposed brainwashed

How and why deepfake videos work — and what is at risk

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

threat ransomware response

The 6 biggest ransomware attacks of the last 5 years

The biggest ransomware attacks illustrate how this particularly nasty genre of attack software has grown from a curiosity and an annoyance to a major crisis.

6 demonstate value metrics

Security technologies that provide the most savings

A new report from Accenture and the Ponemon Institute quantifies which cybersecurity technologies provide the most value to an organization.

CSO Digital Magazine, Spring 2019

CSO50 2019: Seeding security in the cloud

CSO50 award-winning companies are rising to the cloud security challenge and finding new ways to protect data and assets.

pc antivirus

Best antivirus software: 9 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

Bear trap.

What is a honeypot? A trap for catching hackers in the act

A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike.

Load More