Security

Security | News, how-tos, features, reviews, and videos

android anti virus security

Android security: Analysis, advice, and next-level knowledge

Expand your Android security knowledge with this comprehensive collection of level-headed resources.

protection privacy locks security cybersecurity

Google Smart Lock: The complete guide

Google Smart Lock can simplify security and save you time on Android, Chrome OS, and even Mac and Windows. Are you taking advantage of all it has to offer?

pc antivirus

Best antivirus software: 14 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

login password - user permissions - administrative control

Using a password manager: 7 pros and cons

This veteran security pro feels more secure now that he's using a password manager, but there are still risks.

security trust

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

blockchain bitcoin circuitry global

Blockchain: What’s it good for? Absolutely nothing, report finds

Blockchain has entered Gartner's 'Trough of Disillusionment' as a new report cites dozens of purported success stories that turned out to be failures.

security internet network encryption privacy padlock

What is SSL, TLS? And why it’s time to upgrade to TLS 1.3

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

workplace distractions donuts crazy

10 of the coolest and wackiest tech stories of 2018

From quantum computing to smart drones, network security goofs and AI developments it has been an interesting year.

laptop analytics data scientist analytics process doctor electronic medical records remote physician

Amazon launches patient data-mining service to assist docs

Through its Amazon Web Services platform, Amazon is offering an A.I. engine that can cull useful information from millions of unstructured electronic files, including patient electronic medical records.

Windows 10 devices

FAQ: Windows 10 LTSB explained

The 'Long-term Servicing Branch' of Windows 10 was initially aimed at enterprises that wanted to avoid Microsoft's Windows-as-a-service model and delay frequent feature updates. Here's how it's supposed to work.

Office 365 software boxes

Microsoft's multi-factor authentication service flakes out – again

For the second time in nine days, the Multi-Factor Authentication system used by Microsoft for Office 365 logins failed.

smart city iot digital transformation networking wireless city scape skyline

What will be hot for Cisco in 2019?

Software, SD-WAN, security, high-speed data-center networking, and more software fill up the Cisco hot plate for 2019.

#slack signage

10 Slack security tools compared

Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.

intro cyber attack maps

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

windows hello fingerprint

What is Windows Hello? Microsoft’s biometrics security system explained

Windows Hello gives Windows 10 users an alternative way to log into their devices and applications using a fingerprint, iris scan or facial recognition. Here’s what the technology does, who uses it and the hardware required.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

BlackBerry's acquisition of Cylance raises eyebrows in the security community

BlackBerry's move into the endpoint security game may create public safety issues, given the company's history with encryption backdoors, experts say.

ransomware breach hackers dark web

10 things you should know about dark web websites

Catch a glimpse of what flourishes in the shadows of the internet.

certificate

Google makes good on promise to remove some Symantec PKI certificates

If you get this digital certificate error using Chrome, then Google now considers that website's Symantec PKI certificate untrustworthy.

shipping containers

7 container security tools to lock down Docker and Kubernetes

These extra-strength tools bring monitoring, auditing, runtime defenses, and policy-based controls to containers in development and production

Mobile security

6 mobile security threats you should take seriously in 2019

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these issues in the coming year.

Load More