Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

cryptolocker -ransomware - flickr
dsc 1707

security lock code

Flash Player remains target of choice for exploit kits

A recent report finds that six of the top 10 vulnerabilities target Flash Player as cybercriminals take advantage of irregular and slow patching schedules

img 20161206 181722 01 01 01

Malicious online ads expose millions to possible hack

The attack campaign, called Stegano, has been spreading from malicious ads hosted by news websites

artificial intelligence AI machine learning brain circuit

IBM Watson steps into real-world cybersecurity

Watson for Cyber Security is a beta program that introduces IBM's machine learning technology to real-world security environments

microsoft windows 10 sign

Here’s how the Windows 10 Creators Update helps enterprises

New features include enhanced security, analytics, and device management

Apple iPhone 5S (1)

App developers not ready for iOS transport security requirements

Many iOS apps opt out of Apple's App Transport Security (ATS) feature or deliberately weaken it

security disaster recovery

4 top disaster recovery packages compared

System administrators identify the best features — and what’s missing — in four leading software suites for disaster recovery

3648438218 2ecc0c3414 o

Obama's cybersecurity plan faces uncertainty with Trump

The Obama-backed commission has come up with a variety of recommendations to improve the country's cybersecurity problems

lawsuit judge law court decision sued gavel

Why it's so hard to prosecute cyber criminals

The bad guys are wreaking havoc. Why can't they be brought to justice?

cloud security skywriting

The cloud storage security gap -- and how to close it

Cloud storage vendors don't provide a comfortable balance for some IT admins, but third-party options get you part way there

SSL padlock icon security

Chrome bug triggered errors on websites using Symantec SSL certificates

The bug affected Chrome on all platforms, as well as the WebView component on Android

grave stones

How to survive the death of Flash

What should an enterprise ban Flash, phase it out, or accept that it will remain as legacy software for the foreseeable future? Here’s a guide

privacy lock security public domain

How Windows 10 data collection trades privacy for security

Here's what data each telemetry level collects and the price you pay to send the least telemetry to Microsoft

padlock unlocked security hole flaw

7 security predictions for 2017

If you thought 2016 was bad, fasten your seat belts -- next year is going to be even worse

werner vogels aws reinvent 2016

AWS tries to protect its customers from DDoS attacks with new service

Shield is available for free and enabled by default for all web applications running on AWS

blame 174280704

Who's responsible for data compliance? 25% of execs don't know

A new survey sheds some light on just how little grasp U.S. organizations have on privacy and security regulations

video

Security Sessions: Lessons learned from the Dyn DNS attacks

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Stephen Boyer, CTO and co-founder of BitSight, about the recent DNS attacks against Dyn, and how CSOs can prepare their systems against future...

security threat ninja hacker hacked

10 key security terms devops ninjas need to know

If devops teams are going to move fast without breaking security, they’ll need to learn key IT security concepts

nest camera

16% off Nest Cam Indoor Security Camera - Deal Alert

With Nest Cam Indoor, you can check in -- even when you’re out. 24/7 live streaming. No dead batteries. And a versatile magnetic stand that lets you put it anywhere. Nest Cam is currently discounted 10% on Amazon.

Load More