5 steps to stronger data security

5 steps to stronger data security

The old cliche is true: Your organization's most precious asset is its data. Five basic security building blocks can ensure its safety

05/24/16

Defend yourself! Build a cyber security database

Defend yourself! Build a cyber security database

Attackers have all kinds of data about the threat landscape -- and about your organization, if it happens to be a target. Now's the time to arm yourself with data, too

05/17/16

You too? Who's on the hacker hit list

You too? Who's on the hacker hit list

You don’t need to carry the keys to the enterprise network to have a malicious hacker tail you. Here’s who’s at risk and what to do about it

05/10/16

Tick-tock: Time is running out to move from SHA-1 to SHA-2

Tick-tock: Time is running out to move from SHA-1 to SHA-2

Stop procrastinating and make the switch from SHA-1 to SHA-2. You may already be getting errors -- and in 2017 things will get a lot worse

05/03/16

The dark side of biometric identification

The dark side of biometric identification

Authorities are using your fingerprints, your face, and even your DNA to authenticate you. If you think that will stop cyber fraud, think again

04/26/16

Hands-on: Go (almost) anonymous on the Internet with Anonabox

Hands-on: Go (almost) anonymous on the Internet with Anonabox

Want to elude snooping at home and abroad? The preconfigured Anonabox router is easier to use than Tor software alone and provides greater protection

04/19/16

Behold the glorious future -- with the same old security

Behold the glorious future -- with the same old security

From delivery drones to implanted medical monitors, technology is about to become more incredible -- but not more secure

04/12/16

Digital certificates are helping deliver malware

Digital certificates are helping deliver malware

When digital certs go bad, whom can you trust? Follow these procedures to get as much assurance as you can

04/05/16

Spread honeypots over your defense plan

Spread honeypots over your defense plan

Deployed properly, a honeypot catches intruders like flies to, well, you know what. They deliver enormous value for a modicum of up-front effort

03/29/16

Get hired as a security pro: Insider tips

Get hired as a security pro: Insider tips

Qualifications are one thing. The characteristics that make a security job candidate great are another

03/22/16

The best new security features of Windows 10

The best new security features of Windows 10

With deep protection at its core, Windows 10 is the most secure Windows ever, from virtualization-based security to Windows Hello to Enterprise Data Protection

03/15/16

Why security is really all about trust

Why security is really all about trust

Once you lose faith in a company and its products, no amount of security will restore your trust

03/08/16

Why the feds' iPhone-cracking loss is our gain

Why the feds' iPhone-cracking loss is our gain

The government has been blocked not only from cracking open an iPhone, but from eroding encryption -- and personal privacy -- as we know it

03/01/16

Why we must defend our last shred of privacy

Why we must defend our last shred of privacy

The Apple encryption saga is not about a single phone. We've already lost more privacy than we realize -- and we can't afford to lose more

02/23/16

When it comes to security, it's the data, stupid

When it comes to security, it's the data, stupid

You can't prioritize risk effectively without accurate data about successful exploits in your environment. Start compiling that data now

02/16/16

5 tips to protect your admin credentials

5 tips to protect your admin credentials

Credentials are the main battlefront in our ongoing computer security war. Deploy everything you have to keep them safe

02/09/16

5 steps to make threat intelligence work for you

5 steps to make threat intelligence work for you

Determining your top threats is not rocket science -- and the effort will pay off in successful mitigations

02/02/16

Why patching is still a problem -- and how to fix it

Why patching is still a problem -- and how to fix it

Many obstacles stand in the way of perfect patching. Getting around them may be easier than you think

01/26/16

Why you don't need an RFID-blocking wallet

Why you don't need an RFID-blocking wallet

You don't need a tinfoil hat, either. Opportunists have exploited consumer fears to create an industry that doesn't need to exist

01/19/16

Train your users to beat phone scams

Train your users to beat phone scams

'Press 1 to hand us the family jewels' works more often than you might think. A little training can stop this sort of social engineering

01/12/16

Load More