Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

patch

6 steps for a solid patch management process

Patch management is simply the practice of updating software – most often to address vulnerabilities. Although this sounds straightforward, patch management is not an easy process for most IT organizations. Here are the steps you need...

social media multiple logos

Reputational risk and social media: When you're blocked or banned without notice

Businesses depend on sites like Facebook, Twitter, Dropbox, and Apple to interact with customers, promote their messages and store content. One complaint against you can shut you off from those services and damage your brand.

saas kaboom

Cisco broadens Tetration security delivery with cloud, virtual buying options

Cisco's Tetration-V and Tetration-SaaS give businesses interested in the security-analytics platform the option of a cloud service or software that runs on virtual appliances.

IBM Z mainframe

IBM tweaks its z14 mainframe to make it a better physical fit for the data center

IBM is making rack-mounted versions - ZR1 and Rockhopper II - of its latest z14t mainframe, that are able to securely run containerized software.

data breach thinkstock

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

global network connections / transactions

How blockchain could solve the internet privacy problem

Blockchain, with its encrypted and immutable record, will eventually be used create universal digital identities, filled with information that only we will control and that will link back to the issuing banks, governments or even...

fact fiction debunk myths truth

5 myths of API security

In light of Panera Bread’s API-related data breach, here what is — and isn’t — true about protecting application programming interfaces.

security vulnerabilities such as hackers and cyberattacks

What hackers do: their motivations and their malware

Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense.

Election 2016 teaser - Electronic voting security

Voting machine vendor firewall config, passwords posted on public support forum

"This is gold" for a nation-state attacker that wanted to hack an election.

honeybot

Malicious IoT hackers have a new enemy

A robot called HoneyBot, designed by researchers at Georgia Tech’s School of Electrical and Computer Engineering, can fool bad actors into believing they have compromised an IoT device and send alerts of the attack to hasten defensive...

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

digital money - binary code

How to detect and prevent crypto mining malware

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.

framework metal

What is Mitre's ATT&CK framework? What red teams need to know

The ATT&CK framework allows security researchers and red teams to better understand hacker threats.

best home security cameras
Update

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

Government building with greek columns

What is FedRAMP? How cloud providers get authorized to work with the U.S. government

The process for getting the FedRAMP seal of approval is complex, but it can ultimately be lucrative for companies that meet the security requirements.

07 vote

Want to hack a voting machine? Hack the voting machine vendor first

How password reuse and third-party breaches leave voting machine vendors vulnerable to attack.

ransomware

11 ransomware trends for 2018

Ransomware creators are getting more sophisticated in how they infect systems, avoid detection, and foil decryption efforts.

facial recognition access identification biotech

Facial recognition tech moves from smartphones to the boardroom

With the release of Apple's iPhone X and its Face ID feature, facial recognition technology has become more mainstream – and it's already being piloted by some government agencies and commercial airlines as a friction-free security...

mobile security stock image one bad device

Don’t rush to deploy 5G if you want IoT security, agency warns

Flaws in 2G, 3G and 4G networks could be repeated in 5G, says EU IT security agency

passwords

1.4B stolen passwords are free for the taking: What we know now

The 2012 LinkedIn breach, along with other old third-party breaches, is still paying dividends for criminals, who now have free access to 1.4 billion previously exposed email addresses and passwords.

Load More