Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

Yahoo
ddos krebs

Vinton Cerf Heidelberg Laureate Forum

Vint Cerf's dream do-over: 2 ways he'd make the internet different

'I doubt I could have gotten away with either one,' says the father of the internet

yahoo mail

Hackers have a treasure trove of data with the Yahoo breach

The data breach affects at least half a billion Yahoo accounts

data privacy ts

Tech leaders must act quickly to ensure algorithmic fairness

Do big data algorithms treat people differently based on characteristics such as race, religion, and gender? Tech leaders must take seriously the debate over data usage -- both because discrimination in any form has to be addressed,...

yahoo mail

Yahoo reportedly to confirm massive data breach

Some users have already been asked to change passwords, after a data breach that affects hundreds of millions of accounts

security code big data cyberespionage DDoS

More than 840,000 Cisco devices are vulnerable to NSA-related exploit

The vulnerability could allow hackers to extract potentially sensitive information from devices' memory

managed security service providers

Lockdown! Harden Windows 10 for maximum security

To make the most of Windows 10's security improvements, you must target the right edition and hardware for your needs

cloud person spiral

Caught between security and stupidity

A simple call to tech support first uncovers an alarming problem, then leads to another festering issue at a client company

bos16 networking security

Bossie Awards 2016: The best open source networking and security software

InfoWorld's top picks among open source tools for connecting devices and securing those devices and connections

2016 bossies main

Bossies 2016: The Best of Open Source Software Awards

InfoWorld editors and contributors pick the top open source software for datacenters, clouds, developers, big data analysts, and IT pros

video

IT security: 3 things you need to know now

Computerworld, CSO and CIO surveyed 287 business and IT leaders on the state of security in their organization. Here's what they had to say (it ain't always pretty...).

120215 hacker

Seagate NAS hack should scare us all

An under-the-radar news story proves that computers are far from the only devices prey to attack

devices mobile laptop computer tablet smartphone

Your PC is simply another mobile device

IT needs to start planning now for the day when PCs are managed and secured like mobile devices, and desktop apps are developed and deployed like mobile apps

20151005 Cisco headquarters sign

Cisco patches Equation group exploit in IOS, IOS XE, and IOS XR devices

Investigation of a leaked Equation group exploit leads to the discovery of a similar vulnerability

scores table workers ratings

Security scores for cloud companies on the way

Businesses will be able to use the Vendor Security Alliance-designed questionnaire to evaluate the security practices of third-party partners

stop sign bullet holes

Emerging technologies are poking holes in security

Accelerated change challenges change management, security devops and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the...

ballot box voting

The real threat to our elections: Disinformation and doubt

Hackers are working to sabotage the upcoming election, but not through the expected avenues

authentication

New Google API cryptographically secures Chromebooks

The Verified Access API uses the Trusted Platform Module to cryptographically identify and assess the security posture of Chrome OS devices

glasses focus clouds buildings

Tenable brings network visibility into Google Cloud Platform

Tenable SecurityCenter Continuous View gives IT administrators visibility over their applications hosted in Google Cloud Platform

Load More