Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

cyber attack stock image
Apple security

video

Security Sessions: The pitfalls of security awareness training

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Bill Rosenthal, CEO of Logical Operations, about what's missing in many security awareness training programs that enterprises often deploy (if...

spotlight

A deeper look at business impact of a cyberattack

Hidden costs can amount to 90% of the total business impact on an organization, and will most likely be experienced two years or more after the event

elctrical plug shock

Side channel power, the new security front

Power analysis may be a way to secure devices on the internet of things

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

Paranoia rules! 5 types of imaginary malware

Computer security attracts all sorts of skeptical personalities. A little doubt is healthy; a lot may mean you should seek professional help

devops

Automate, integrate, collaborate: Devops lessons for security

Devops is transforming application development; the same principles of automation, integration, and collaboration can vastly improve security as well

clicks pageviews traffic denial of service ddos attack

Poorly configured DNSSEC servers at root of DDoS attacks

Admins need to ensure that their DNSSEC domains are properly set up -- which can be easier said than done

twitter logo shattered glass

Twitter suspends 360,000 accounts for terrorist ties

The social network has suspended 235,000 in last six months alone, with rate of daily suspensions up 80%

NSA headquarters

The NSA's hoard of cyber weapons makes some experts nervous

An alleged hack has raised questions about the agency's practices

bad password pin 1234

Keep using password managers -- bugs and all

A furor over bugs in password managers left users in a jam. Self-proclaimed security empress Jessy Irwin clears up the confusion

wifi security cam

50% off Vimtag VT-361 Pan&Tilt HD WiFi Video Security Camera with Night Vision - Deal Alert

This full-featured camera broadcasts over wifi allowing you to view from multiple mobile devices, and records to micro SD. Remote pan/tilt, 2-way voice, and night vision capabilities included.

NSA headquarters

Alleged NSA data dump contains sophisticated hacking tools

Cisco said that the sample files reveal an undetected software flaw in its products

video

Samsung Galaxy Note7 iris scanner review

CIO.com's Al Sacco goes hands on with the Samsung Galaxy Note7 smartphone and its new biometric iris scanner.

trump chart

Trump's 'extreme' anti-terrorism vetting may be H-1B nightmare

Many people from 'dangerous and volatile regions' work in the U.S. on H-1B visas, and Trump's plan would penalize these workers because of their birthplace.

ransomware locked computer stock image cropped

Cerber ransomware earns $2.3M with 0.3% response rate

The fast-growing Cerber ransomware uses an affiliate distribution model that recruits non-technical customers, according to a new report by Check Point

iris scan security 138208300

Galaxy Note 7 catches the eye and more

The new Samsung phablet provides a full portfolio of security options that truly advance the Android cause for business

snow globe with winter scene

How 3 fintech startups are shaking up security

The financial industry has invested heavily in staff, processes, and technology to improve security, but some startups are taking a more innovative approach

party favors

6 security advances worth celebrating

In a world besieged by criminal hackers, we'll take all the good security news we can get. Here are six advances that can improve your defenses

shellshocked bash bug

Organizations can learn from Apple's bug bounty approach

Not all bug bounty programs need to be public free-for-alls. Apple provides a slower model

Load More