Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

fivetotry nov20 gameofthrones
4tb drive

Cloud Security

AWS unveils AI monitoring for Amazon S3

Amazon Macie discovers and classifies sensitive data in S3 and automatically alerts to unusual activity and exposures

Hacking stealing password data

How to prevent the hacked AI apocalypse

Adversarial attacks can undermine AI systems, sidelining their intelligence and hijacking them for evil. But there are emerging techniques to block such attacks

cloud security

How cloud-native security can prevent modern attacks

Cloud-native security can prevent modern attacks. Here's why and how

Mingis_on_Tech
video

Mingis on Tech: Android vs iOS – Which is more secure?

Apple's iOS has long had the reputation of being more secure than Android, but that may not necessarily be the case. Here's how to evaluate each side's claims about mobile security.

aukey dashcam

22% off Aukey Dash Cam, Full HD Wide Angle With Night Vision - Deal Alert

This cam features an emergency recording mode, activated by sharp turns or sudden stops, which automatically captures unexpected driving incidents.

Blackhat_2017
video

Chasing down leakers fast with ThinAir's asset tracking

Tony Gauda, CEO of ThinAir, talks with CSO senior writer Steve Ragan about how the ThinAir system tracks which users within an organization have seen each piece of data, spotting anomalous information and quickly finding the source of...

Blackhat_2017
video

Do developers care about security?

They certainly do, according to Sarah Gibson, application security consultant at Veracode, who talks with CSO senior writer Fahmida Rashid about the issues around application security, and how having a collaborative security team is...

Blackhat_2017
video

Safeguarding power grids and other critical infrastructure from data leaks

CSO senior writer Steve Ragan talks with cybersecurity experts Krypt3ia and Kodor about how the pair seek out passwords, schematics and other sensitive documents on SCADA control system architectures that shouldn't be available...

Blackhat_2017
video

Bringing behavioral game theory to security defenses

Kelly Shortridge and CSO senior writer Fahmida Y Rashid talk about using behavioral game theory to take advantage of hackers’ mistakes and manipulate the data they think they're receiving. People generally make decisions by either...

Faraday_Blackhat2017
video

Simple tips to keep your devices secure when you travel

CSO security reporters Fahmida Rashid and Steve Ragan share some easy ways to keep your data and devices secure while traveling, even at the Black Hat conference, where active scanning is the norm. (And check out the built-in Faraday...

Blackhat_2017
video

How DevOps and cloud will speed up security

Zane Lackey, CSO and co-founder of Signal Sciences, talks with CSO senior writer Fahmida Rashid about how DevOps and cloud can help organizations embed security into their technology structures, enabling business to move faster.

Blackhat_2017
video

Stop blaming users for security misses

Does the message to users about security need to change? Or does IT need to rebuild infrastructure so users can worry less about security? Wendy Nather, principal security strategist at Duo Security, talks with CSO senior writer...

Mingis_on_Tech
video

Mingis on Tech: How linguistics can help catch cyberattackers

When it comes to tracking down the bad actors behind malware and ransomware, cybersecurity firms are turning to linguists.

csan 001 top 15 security breaches
video

The 15 worst data security breaches of the 21st century

Some of the largest companies in the U.S. have been targets of hackers, including Yahoo, JP Morgan Chase and TJX. Watch as we detail the top 15 breaches and their overall impact on customers or employees.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

1 incident response police tape crime death

The 2 cloud security myths that must die

Too many people treat cloud security as a black-and-white proposition, which risks wasting lots of money or having security gaps—or both

robots [Rog01 / CC BY-SA 2.0]

Google adds Recaptcha API to Android to block the bots

The revised method for distinguishing people from malware bots should make it easier for mobile users to prove they are human

escape tool

24% off Resqme Keychain Car Escape Tool 2-Pack - Deal Alert

Made in the USA and originally developed for first responders, this 2-in-1 safety and survival tool features a blade for cutting a seatbelt and a spring-loaded steel spike for breaking a side window. Keep in on your keychain, or clip...

Load More