9 steps to make you completely anonymous online

9 steps to make you completely anonymous online

The default state of Internet privacy is a travesty. But if you're willing to work hard, you can experience the next best thing to absolute Internet anonymity

08/25/15

10 years on: 5 big changes to computer security

10 years on: 5 big changes to computer security

In the 10 years since Security Adviser debuted, the threats have changed -- as have the defenses, and no one can argue computer security is safer overall

08/18/15

Make stolen data worthless

Make stolen data worthless

You can't stop intruders from penetrating your network, but with the right DLP solution, you can encrypt stolen data so it can never be used

08/11/15

Bug-free code: Another computer security lie

Bug-free code: Another computer security lie

The computer security industry has a dirty secret: If an 'independent' code review says a product is totally secure, you aren't hearing the full story

08/04/15

7 easy steps to Internet street smarts

7 easy steps to Internet street smarts

The Internet is a lawless place rife with shady characters. Learn to avoid their sleazy ploys and get back home safe

07/28/15

Waste of time or wise investment? Two sides of user security training

Waste of time or wise investment? Two sides of user security training

Cynics say no amount of security training can prevent users from slipping up and bulletproof defenses are the only answer

07/21/15

Evil conspiracy? Nope, everyday cyber insecurity

Evil conspiracy? Nope, everyday cyber insecurity

You don't need crackpot conspiracy theories to foretell a wide-scale security cataclysm. Mundane vulnerabilities increase the probability every day

07/14/15

In the security world, the good guys aren't always good

In the security world, the good guys aren't always good

It's hard enough to fix Internet security without bad behavior from many of the entities that are supposed to be protecting our interests

07/07/15

4 fatal problems with PKI

4 fatal problems with PKI

The Web's security runs on complicated PKI deployments, few of which are implemented correctly, and all of which will soon be at the mercy of Moore's Law

06/30/15

Prepare for the big digital cert swap -- or else

Prepare for the big digital cert swap -- or else

In a year or two, SHA-1 certificates will be rejected across the Internet. Now's the time to plan your migration from SHA-1 to SHA-2 and avoid a crisis

06/23/15

Your ‘offline’ storage may be putting you at risk

Your ‘offline’ storage may be putting you at risk

What some admins consider to be offline resources aren't truly offline; the difference could mean disaster

06/16/15

Behind every major breach, many 'manageable' risks

Behind every major breach, many 'manageable' risks

Don't sweat the small things, the saying goes. But over time, small risks add up, until you end up with a tower ready to topple

06/09/15

Don't fall for the USA 'Freedom' Act

Don't fall for the USA 'Freedom' Act

The mainstream media has celebrated the USA Freedom Act as a victory for civil liberty. It couldn't be further from the truth

06/05/15

Time to address your 100,000 vulnerabilities

Time to address your 100,000 vulnerabilities

You know your security has weak spots, but it's hard to know where to begin -- this might get you on track

06/02/15

How to stop Wi-Fi hackers cold

How to stop Wi-Fi hackers cold

When someone hacked a neighbor's Wi-Fi router to engage in nefarious activities, the only effective defense was to plug a widespread WPS vulnerability

05/26/15

Containers have arrived -- and no one knows how to secure them

Containers have arrived -- and no one knows how to secure them

When you add yet another layer to the stack, you add security complexity, no matter what the proponents of Docker or competing container solutions say

05/19/15

Get real about user security training

Get real about user security training

Do you despair that users will never learn to avoid stupid security mistakes that compromise your organization? Maybe you're not spending enough time and effort on training

05/12/15

We need the Internet police now more than ever

We need the Internet police now more than ever

Beyond the reach of traditional policing, Internet crime calls for a new kind of law enforcement agency

05/05/15

3 ways security risk assessment goes wrong

3 ways security risk assessment goes wrong

Even pro computer security defenders have trouble separating real threats from unlikely ones. Here are three crucial -- and common -- mistakes to avoid

04/28/15

Can you hack an airplane? Brace yourself

Can you hack an airplane? Brace yourself

Suddenly, everyone is worried about malicious hackers breaching networks connected to airplane control systems

04/21/15

Load More