Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

risk shark attack stormy seas life preserver rescue
secure encrypted internet web browser address bar

Windows security and protection [Windows logo/locks]

Microsoft locks down Windows 10 with the S edition

New security features and limits on what you can load and customize promise to make Microsoft Windows 10 S the more secure version ever. It might not be for everyone, though.

template c100.00 01 18 00.still001
video

How deception technologies use camouflage to attract attackers | Salted Hash Ep 26

Host Steve Ragan reports from the show floor at RSA 2018, where talks with Chris Roberts, chief security architect at Acalvio Technologies, about the benefits and misconceptions of deception technologies.

secure encrypted internet web browser address bar

Google details how it will overturn encryption signals in Chrome

Google has fleshed out its plans to upend the way browsers warn users of insecure websites, spelling out gradual steps the company will take with Chrome.

MissionDarkness - Faraday bag / phone

Easy mobile security the Faraday way

Wireless attacks are unpredictable and complicated. Here’s an easy way to block everything.

FinTech - financial technology - blockchain network - distributed ledger wireframe

What is blockchain? The most disruptive tech in decades

The distributed ledger technology, better known as blockchain, has the potential to eliminate huge amounts of record-keeping, save money and disrupt IT in ways not seen since the internet arrived.

GDPR, legal, European Union

Tech Talk: As GDPR looms, companies rush to comply

Our tech experts take a look at what the May 25 deadline for compliance with new EU privacy rules means, and how companies are struggling to make sure they're ready.

tech talk opening.00 14 30 21.still001
video

Tech Talk: Prepping for GDPR

CSO's Michael Nadeau and Steve Ragan join Computerworld's Ken Mingis and IDG Communications' Mark Lewis to look at what the new EU privacy rules mean. They offer insights on how companies can prepare – and what happens if they don't.

group chat services - Telegram

What is Telegram and is it secure?

The Telegram messaging app has grown in popularity since its launch in 2013, but not without controversy.

cwan 011 blockchain
video

What is blockchain technology?

Cryptocurrency such as Bitcoin has garnered most of the media coverage and hype to date, but keep your eye on blockchain – this new technology is poised to change IT in much the same way open-source software did a quarter century ago....

chuck robbins cisco ceo

Cisco CEO trumpets Catalyst 9K advances, software business success

CEO Chuck Robbins talks about the shift to subscriptions for Cisco services, the company's cloud strategy, intent-based networking

lock, chain, blocks and binary code

Solving a blockchain conundrum: Biometrics could recover lost encryption keys

While blockchain holds the promise of creating a secure global network over which anyone can exchange data for a myriad of business or personal transactions, the encryption behind the distributed ledger also means if you lose your...

template c100.00 06 00 09.still001
video

What an Apple phishing attack looks like | Salted Hash Ep 32

How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.

eye on computer monitor showing privacy security or breach

How privacy is moving data security to the top of corporate agendas

It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.

template c100.00 09 18 18.still001
video

Get a hands-on, inside look at the dark web | Salted Hash Ep 25

Reporting from RSA 2018, host Steve Ragan helps dispel the hype and confusion surrounding the dark web, as he talks with Alon Arvatz, co-founder at IntSights.

template c100.00 02 22 03.still001
video

Can AI help bridge the IT security skills gap? | Salted Hash Ep 27

Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to...

Microsoft Windows 10 logo bandage data map

What’s new in Windows 10 security features: The privacy edition

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1803 feature release.

Gmail

Watch out for Gmail’s new Confidential Mode

It’s easy and useful, but Google’s new ‘secure email’ is neither secure nor email.

mobile connection endpoint protection

5 top trends in endpoint security for 2018

Endpoint security is focused on locking down endpoints — individual computers, phones, tablets and other network-enabled devices — in order to keep networks safe. Of course, as threats evolve, endpoint security suites must evolve as...

Load More