Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

nup 177120 0001
European Union, EU

meltdown spectre

Microsoft's free analytics service sniffs out Meltdown, Spectre patch status

Windows Analytics can now scan enterprise PCs running Windows 10, Windows 8.1 and Windows 7 and report on whether they're prepped to fend off attacks based on the Meltdown and Spectre vulnerabilities.

marketing certifications hp

13 emerging IT certifications for today’s hottest skills

From the cloud, to cybersecurity, to data analytics — these new and emerging IT certifications are growing in popularity and demand, according to a report from Global Knowledge.

iot threats security

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

Windows security and protection [Windows logo/locks]

Microsoft to cover Windows 7 with advanced threat service

Windows Defender Advanced Threat Protection can detect ongoing attacks on corporate networks, investigate the attack or breach, and provide response recommendations. It will be added to Windows 7 and 8.1 by this summer.

Man pointing to security icon for email

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.

blockchain challenge

Microsoft wants to use blockchain to secure your identity

Microsoft plans to pilot a blockchain-based digital ID platform that would allow users to control access to sensitive online information via an encrypted data hub.

slide 14 chrome logo

Chrome 68 to condemn all unencrypted sites by summer

Google in July will start inserting a 'not secure' label in the address bar of every website that uses HTTP connections between its servers and users.

online dating scams hacker beautiful woman

How to prove and fight online dating and romance scams

Friends and family of romance scam victims sometimes call on security pros to prove their online loves are not who they claim to be. Here's how to handle the case the right way.

Microsoft Windows 10 logo bandage data map

What’s new in Windows 10 security features: The anti-ransomware edition

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for 1709, Fall Creators Edition.

salted hash thumbnail final
video

Managing open-source mobile security and privacy for activists worldwide | Salted Hash Ep 18

Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the...

03 emm

Mobile app management is being driven by unmanaged devices

The growth in unmanaged devices owned by employees or contractors is driving adoption of stand-alone mobile application management (MAM) software and services, according to a new report.

drowning in red tape bureaucracy ai machine learning

What does the GDPR and the "right to explanation" mean for AI?

Security teams increasingly rely on machine learning and artificial intelligence to protect assets. Will a requirement to explain how they make decisions make them less effective?

bitcoin security vault

Governments eye their own blockchain cryptocurrencies

This year will see the maturation of blockchain, as 2017's pilot projects turn into 2018's real-world implementations in a variety of industries. That includes governments, some of whom are now testing cryptocurrencies as fiat money.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

internet security privacy

What is personally identifiable information (PII)? How to protect it under GDPR

The EU's General Data Protection Regulation requires companies to protect the privacy of their EU customers. That means keeping personally identifiable information (PII) safe. Here's what you need to know.

patching against ransomware

The two most important ways to defend against security threats

Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.

SHEp17
video

Spectre and Meltdown | Salted Hash Ep 17

What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.

Linux, macos and Windows security locks up data

Why Linux is better than Windows or macOS for security

Decisions made years ago about which operating system to roll out can affect corporate security today. Of the big three in widespread use, one can credibly be called the most secure.

Load More