Security

Security | News, how-tos, features, reviews, and videos

pc antivirus

The best antivirus software? Kaspersky, Symantec and Trend Micro lead in latest tests

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, Windows antivirus tools still play an important role in the enterprise security strategy.

sort filter folders organizing

Why you need centralized logging and event log management

Collecting too much log data overwhelms systems and staff. Centralized event log management lets you filter for the most significant security data.

Specialized channels is the mainstay of security game: Adel Eid, Sophos

Sophos is emphasizing on its security solutions across network and end point through its ‘synchronized security’ offering for modern companies. With channel ecosystem undergoing a massive change in the digital era, ChannelWorld spoke...

6 password

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

Apple Health Records

Apple's Health Record API released to third-party developers; is it safe?

At its Worldwide Developer's event this week, Apple said the API for its Health Records platform has been released to developers and researchers so they can create apps for the medical information sharing platform. Once data is ported...

nycrr cybersecurity gavel regulation compliance law nyc statue of liberty

What is the New York Cybersecurity Regulation? What you need to do to comply

Officially called 23 NYCRR 500, this regulation requires financial services firms doing business in New York to have a full security risk assessment and plan.

Movie preview test pattern
Update

Best security software: How 12 cutting-edge tools tackle today's threats

In these security software reviews, we go hands-on with some of the most innovative, useful and, arguably, best security software from today's most important cybersecurity technology categories.

sdn control

SDNs and NFV are complementary and core components of modernized networks

Software-defined networking and network functions virtualization both untie tasks and functions from hardware and provide agility, one for the network itself, the other for network services.

user authentication

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness.

FinTech - financial technology - blockchain network - distributed ledger wireframe

What is blockchain? The most disruptive tech in decades

The distributed ledger technology, better known as blockchain, has the potential to eliminate huge amounts of record-keeping, save money and disrupt IT in ways not seen since the internet arrived.

man typing on laptop search internet web browswer

What is Shodan? The search engine for everything on the internet

Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured.

login password - user permissions - administrative control

Are regulations keeping you from using good passwords?

Most companies are using password "best practices" that are out of date and ineffective. Regulations are getting in the way of changing them.

facebook hallway london headquarters reuters toby melville rtx3l5uy

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection...

1 the state of it security 2018 intro

The state of IT security, 2018

Who's in charge of IT security? To whom do they report? How big is their budget? We've got answers.

ransomware

What does a ransomware attack cost? Beware the hidden expenses

The ransom is only a tiny portion of the total cost of a ransomware attack. Consider these associated costs when estimating the total damage.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

mobile connection endpoint protection

5 top trends in endpoint security for 2018

Endpoint security is a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones on their networks to keep out malware and intruders. Let's look at what the year ahead has in store.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier.

risk shark attack stormy seas life preserver rescue

Oracle plans to dump risky Java serialization

A “horrible mistake” from 1997, the Java object serialization capability for encoding objects has serious security issues

secure encrypted internet web browser address bar

How your web browser tells you when it's safe

As Google moves to change how its Chrome browser flags insecure websites, rival browsers may be forced to follow suit. Here's how other browsers currently handle website security and what changes they have coming.

Load More