Free public certificate authorities: Nice idea, big flaw

Free public certificate authorities: Nice idea, big flaw

Certificate authorities such as Let's Encrypt attempt to provide a valuable service for all. But there's a serious problem with what they offer

03/28/17

Vastly improve your IT security in 2 easy steps

Vastly improve your IT security in 2 easy steps

Losing the battle against the bad guys? Keep your software patched and defend against social engineering, and you might start winning a few

03/21/17

6 security essentials the CIA forgot

6 security essentials the CIA forgot

Good security isn't magic. Common-sense measures could have stopped all those secrets from being revealed and damaging the agency

03/14/17

4 strategies to root out your security risks

4 strategies to root out your security risks

To defend yourself, you must first understand the security flaws that let bad guys exploit your environment

03/07/17

Red alert! Beware of insiders bearing APTs

Red alert! Beware of insiders bearing APTs

Big enterprises worry about APTs -- and employees who may be using them to engage in corporate espionage. These measures can help you catch the perps

02/28/17

Build your security defense on data, not guesswork

Build your security defense on data, not guesswork

Stop obsessing about the latest overhyped security threats. Delve into your own data about successful attacks on your organization first—and defend accordingly

02/21/17

Prepare for the smart bot invasion

Prepare for the smart bot invasion

We all know about the havoc wreaked by malicious bots, but soon, we'll have to deal with 'good' bots. How do you tell the two apart?

02/14/17

Fretting over fake news? It's only going to get worse

Fretting over fake news? It's only going to get worse

Soon, not even experts will be able to tell the difference between fraudulent and genuine content. Ultimately, it comes down to the reputation of whoever created it

02/07/17

Better security through obscurity? Think again

Better security through obscurity? Think again

Hackers may not target obscure apps as often as popular software, but your systems still won't be much safer

01/31/17

The evolution of (and solution to) ransomware

The evolution of (and solution to) ransomware

Ransomware has become the scourge of the internet 28 years after it first appeared. Here's how to prevent infection and recover if you're hit

01/24/17

Got microservices? You'd better secure them

Got microservices? You'd better secure them

Our modern world of containers and microservices presents new challenges that open new vulnerabilities if left unaddressed

01/17/17

Q&A: RSA crypto pioneer Adleman keeps pushing the limits

Q&A: RSA crypto pioneer Adleman keeps pushing the limits

Dr. Leonard Adleman tells InfoWorld all about RSA's big breakthrough, why DNA works great for computing, and our coming cyberwar risk

01/10/17

Better authentication: Go get 'em, FIDO

Better authentication: Go get 'em, FIDO

Security standards always seem to languish in committee, but the FIDO Alliance breaks the mold, rolling out new, usable authentication systems at a rapid clip

01/03/17

The real reason we can't secure the internet

The real reason we can't secure the internet

We can surmount the technical and human obstacles to a dramatically more secure internet, but one factor stands in the way

12/27/16

Maybe security isn't going to get better after all

Maybe security isn't going to get better after all

Is that light at the end of the tunnel? Or is a train coming?

12/20/16

Too many contractors spoil the business

Too many contractors spoil the business

Contractors have their uses, but companies that opt for them by default lose the valuable institutional knowledge that permanent employees can bring

12/13/16

Why it's so hard to prosecute cyber criminals

Why it's so hard to prosecute cyber criminals

The bad guys are wreaking havoc. Why can't they be brought to justice?

12/06/16

3 clues to spotting a spam scam

3 clues to spotting a spam scam

The notice looked real at first -- but turned out to be an obvious scam. Unraveling its origins offered an object lesson in how not to get suckered

11/29/16

Moment of truth: Web browsers and the SHA-1 switch

Moment of truth: Web browsers and the SHA-1 switch

SHA-1 encryption is ending. Here's how your browser will react

11/22/16

5 ways President Trump may affect computer security

5 ways President Trump may affect computer security

You can expect the new administration to take full advantage of surveillance techniques, ease security regulations for business, and mandate more punishment for hackers

11/15/16

Load More