Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

bad security habits
cyberwarfare defense illustration

03 cryptography

Why aren't we using SHA-3?

The Secure Hash Algorithm version 3 fixes flaws in the now-standard SHA-2 cipher. Here's how to prepare for a migration to SHA-3 when SHA-2 is inevitably compromised.

blockchain ecosystem

5 ways blockchain is the new business collaboration tool

While the full potential of blockchain may not be understood by business execs, that's not keeping companies from aggressively exploring how the secure, distributed ledger technology can save time and money.

salted hash thumbnail final
video

Ransomware: Do you pay the ransom? | Salted Hash Ep 19

Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks.

eye binary IDS Intrusion Detection System

What is an intrusion detection system (IDS)? A valued capability with serious management challenges

An IDS monitors network traffic, searching for suspicious activity and known threats and sending up alerts when it finds such items. The function remains critical in the modern enterprise, but maybe not as a standalone solution.

nup 177120 0001

Security lessons from the 2018 Pyeongchang Winter Olympics

Shiny buttons that go "ping!" considered harmful.

European Union, EU

General Data Protection Regulation (GDPR) requirements, deadlines and facts

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

meltdown spectre

Microsoft's free analytics service sniffs out Meltdown, Spectre patch status

Windows Analytics can now scan enterprise PCs running Windows 10, Windows 8.1 and Windows 7 and report on whether they're prepped to fend off attacks based on the Meltdown and Spectre vulnerabilities.

marketing certifications hp

13 emerging IT certifications for today’s hottest skills

From the cloud, to cybersecurity, to data analytics — these new and emerging IT certifications are growing in popularity and demand, according to a report from Global Knowledge.

iot threats security

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

Windows security and protection [Windows logo/locks]

Microsoft to cover Windows 7 with advanced threat service

Windows Defender Advanced Threat Protection can detect ongoing attacks on corporate networks, investigate the attack or breach, and provide response recommendations. It will be added to Windows 7 and 8.1 by this summer.

Man pointing to security icon for email

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.

blockchain challenge

Microsoft wants to use blockchain to secure your identity

Microsoft plans to pilot a blockchain-based digital ID platform that would allow users to control access to sensitive online information via an encrypted data hub.

slide 14 chrome logo

Chrome 68 to condemn all unencrypted sites by summer

Google in July will start inserting a 'not secure' label in the address bar of every website that uses HTTP connections between its servers and users.

online dating scams hacker beautiful woman

How to prove and fight online dating and romance scams

Friends and family of romance scam victims sometimes call on security pros to prove their online loves are not who they claim to be. Here's how to handle the case the right way.

Microsoft Windows 10 logo bandage data map

What’s new in Windows 10 security features: The anti-ransomware edition

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for 1709, Fall Creators Edition.

salted hash thumbnail final
video

Managing open-source mobile security and privacy for activists worldwide | Salted Hash Ep 18

Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the...

03 emm

Mobile app management is being driven by unmanaged devices

The growth in unmanaged devices owned by employees or contractors is driving adoption of stand-alone mobile application management (MAM) software and services, according to a new report.

drowning in red tape bureaucracy ai machine learning

What does the GDPR and the "right to explanation" mean for AI?

Security teams increasingly rely on machine learning and artificial intelligence to protect assets. Will a requirement to explain how they make decisions make them less effective?

Load More