Security

Security | News, how-tos, features, reviews, and videos

Malicious USB dongle / memory stick / thumb drive with skull icon
protection privacy locks security cybersecurity

laptop keyboard with a life preserver or personal floatation device [PFD]

Microsoft to stop serving non-security monthly updates to Windows

The updates, normally released during the third and fourth week of each month, will stop in May.

A binary map of china.

Chinese hacker group APT41 uses recent exploits to target companies worldwide

APT41 has compromised devices and applications from Cisco, Citrix and Zoho across many industries worldwide at a time when many companies are less able to respond.

Danger / threats  >  storm clouds / lightning

ROLLING UPDATE: The impact of COVID-19 on public networks and security

As the coronavirus spreads, public and private companies as well as government entities are requiring employees to work from home, putting unforeseen strain on all manner of networking technologies and causing bandwidth and security...

A Microsoft update gets ready on a screen also displaying a COVID-19 coronavirus visualization.

Securing Windows and Office in a time of COVID-19: update policies, remote options

Delayed updates and a rush to support remote workers have forced IT and security teams to scramble. This information and advice will help them better deal with the crisis.

A businesswoman wears a protective mask in an office.  >  protection from viruses/pollutants/toxins

4 steps to build redundancy into your security team

A biological virus infecting your critical security staff could wreak havoc on your business. These practices will reduce your risk.

Social engineering  >  Laptop user with horns manipulates many social media accounts

Virtual security conferences fill void left by canceled face-to-face events

Notable members of the infosec community are creating impromptu but highly popular virtual events using cheap, off-the-shelf tools.

Statue of Lliberty as a digital framework / New York / binary code

New York's SHIELD Act could change companies’ security practices nationwide

SHIELD Act provisions broaden the scope of consumer privacy and place requirement on protecting personal data for organizations that collect information on New York residents.

Zero-trust / COVID-19 / pandemic

COVID-19 offers a unique opportunity to pilot zero trust, rapidly and at scale

A zero-trust model addresses many of the security concerns around supporting large numbers of remote workers, and new vendor free trials make fast deployment possible.

Someone crouches, head in hands. / fear / stress / debilitation / weakness / exhaustion / fatigue

Cisco warns of five SD-WAN security weaknesses

Cisco has issued five – three on the high-end of the vulnerability scale – warnings about security weaknesses in its SD-WAN offerings.

coronavirus remote worker work from home romolotavani getty

6 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.

businessman on a rock in a stormy ocean

Coronavirus challenges remote networking

COVID-19 sends IBM, Google, Amazon, AT&T, Cisco, Apple and others scrambling to securely support an enormous rise in teleworkers, and puts stress on remote-access networks.

United States national government cybersecurity  >  Diverse hands surround/protect the U.S. Capitol.

Cyberspace Solarium report calls for layered cyber deterrence, defend forward strategy

The intergovernmental commission outlines the steps needed to defend the United States from modern cybersecurity threats.

securitycamera hub image 2019
Updated

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

credit card swipe / crosshairs

Credit card skimmers explained: How they work and how to protect yourself

A card skimmer is a device designed to steal information stored on payment cards when consumers perform transactions at ATMs, gas pumps and other payment terminals. More recently, the use of the term has been extended to include...

Gauges + performance indicators / binary code

6 security metrics that matter – and 4 that don’t

The increasingly high stakes of getting security right and growing board interest means metrics are more important than ever. But there are some metrics that are more useful than others.

CSO  >  ransomware / security threat

Deloitte: 8 things municipal governments can do about ransomware

Deloitte researchers explain why state and local governments are favored for ransomware attacks and how they can protect themselves with limited resources.

interoperable gears / integrated tools / interoperability

Open-source options offer increased SOC tool interoperability

Too many security tools in your SOC, and none of them talk to each other, but new vendor-supported open-source projects might lead to greater interoperability.

Intel CPU  >  security

New CPU attack technique can leak secrets from Intel SGX enclaves

The Load Value Injection attack can bypass security boundaries and mitigations put in place for other CPU vulnerabilities such as Spectre and Meltdown.

Load More