Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

bitcoin currency blockchain finance bank binary

6 use cases for blockchain in security

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection.

Mobile healthcare

Apple's iOS push could change healthcare data sharing, still won't kill the fax

Apple may have finally found a way to enable the large-scale sharing of electronic medical record information on mobile devices. But its tools won't replace the old tried-and-true fax for data-sharing in healthcare.

continuous authentication

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

nordvpn

Get 3 Years of NordVPN Service for Just $2.75 Per Month

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.75 per month for 3 years, if you sign up right now.

network security primary2

The Qubes high-security operating system gains traction in the enterprise

Qubes OS defends at-risk enterprise users from targeted attacks, as well as drive-by malware and the Meltdown exploit.

blockchain cryptocurrency digital security

New cryptocurrencies offer better anonymity, new security challenges

Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.

03 emm

Why Google partnered with MobileIron – and what they plan to offer

Google will use MobileIron's enterprise mobility management platform and analytics software to create App Store-like instances that can be offered through telecom providers.

endpoint security hacker vulnerablility secure mobile security app

4 must-know facts about secure mobile printing

Mobile printing is making major strides right now. Is your company's mobile print security up to speed?

bad security habits

What is microsegmentation? How getting granular improves network security

Microsegmentation is a way to create secure zones in data centers and cloud deployments that allow you to isolate workloads and protect them individually.

pile of credit cards financial tech

Using better data to fight credit card fraud

Galileo Processing uses artificial intelligence to more accurately identify fraudulent credit card transactions. It's an example of how AI can be a powerful security technology.

hand at keyboard with Windows logo

Microsoft releases emergency Windows update to hamstring earlier 'Spectre' defense

Intel urged customers not to deploy firmware updates aimed at the Spectre and Meltdown flaws because the updates caused system instability; Microsoft reacted with its own release – KB4078130 – on Saturday.

hottest and coldest outsourcing trends city globe
video

Tech Talk: What's trending for 2018?

The end of passwords may – or may not – be nigh. Blockchain is clearly evolving, as is 'serverless' computing. And our panel remains convinced Apple's HomePod is late to the game.

mobile device management

WD turns to single app portal to create 'mobile moments' for workers

After acquiring two multi-billion-dollar companies, Western Digital had a choice: continue using disparate methods for corporate application access or rip and replace it all with a single portal. It chose the latter.

iot security ts

The moving target of IoT security

As the explosive growth of IoT tech continues; businesses, vendors and consumers all have to confront the issue that the world is more connected than ever before, with potentially gigantic consequences. The central problem with...

17 open source table laptop group

Are the BSDs dying? Some security researchers think so

To few eyeballs on code is a security issue. Can FreeBSD, OpenBSD, and NetBSD survive?

Computerworld - Mingis on Tech - video podcast teaser [3x2/1800x1200]
video

Mingis on Tech: 2018 and the Blockchain bubble

After a raft of pilot programs last year, blockchain continues to evolve. It's now seen as the heart of a new global shipping platform that could save companies billions and the underpinnings for a P2P cloud storage endeavor.

security training ts

Are bad analogies killing your security training program?

Humans make irrational decisions under pressure. Security training needs to focus on changing behavior, not just raising awareness. Using effective analogies can help.

cyber attack virus meltdown

How bad are Meltdown and Spectre?

Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments.

best home security cameras
Update

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

amazon shredder

Get 29% Off This 6-Sheet Micro-Cut Paper and Credit Card Shredder

This powerful micro-cut shredder turns a letter-sized sheet into 2,235 pieces of confetti, up to 6 sheets at a time. It can also destroy credit cards, rendering them useless.

Load More