Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

data breach predictions
shield protection

security as service 2

Security-as-a-service model gains traction

A new report finds mid-tier companies are increasingly turning to security-as-a-service offerings to manage their network security needs

hacker hack attacke cyber malware keyboard

McAfee: Wave of Shamoon cyberattacks coordinated by a single group

The campaigns are bigger and more sophisticated, and they're causing far more damage as the attackers learn new techniques and collaborate with other groups

us flag blackboard chalk

5 ways the U.S. is educating cybersecurity talent—and what’s still missing

The world is facing a shortage of cybersecurity talent. Here's what's being done to solve the problem

img 20170425 150053 01

Old Windows Server machines can still fend off hacks. Here's how

Many businesses still use Windows Server 2003, even as Microsoft no longer supports the OS

cyberseceng

The 20 highest-paying markets for cybersecurity engineers

IT security professionals are in high demand in most job markets, but some metropolitan areas are better than others when it comes to offering a top paycheck

20160225 stock mwc ericsson booth security locks

Webroot deletes Windows files and causes serious problems for users

The company's antivirus product erroneously flagged files in a Windows folder as malicious

man with online security key

Google zero-trust security framework goes beyond passwords

Google outlines how BeyondCorp determines whether a device should be allowed to access an application in a perimeter-less network environment

bunny computers desktop rabbit

Bash Bunny: Big hacks come in tiny packages

With new hardware hacking devices, it's absurdly easy to attack organizations through the USB port of any computer on a network

alert blur

Be more like Android: How Apple can fix iOS, CarPlay alerts

Android provides a model for Apple to use in iOS, and Apple has an option for CarPlay that should get wider use and be copied by Google

dark web hacker tablet malware

More Shadow Brokers fallout: DoublePulsar zero-day infects scores of Windows PCs

If you haven't installed the March Windows patch MS17-010, you need to hop to it

Legislation of privacy security keyboard law legal gavel court ruling

Russian man receives longest-ever prison sentence in the US for hacking

The son of Russian parliament member Valery Seleznev was sentenced to 27 years in prison for cybercrime-related offences

blockchain ecosystem

FAQ: What is blockchain and how can it help business?

The distributed ledger technology has enormous potential for firms that figure out how best to use it

future what is next

11 technologies developers should explore now

From machine learning to digital twins, opportunities abound in emerging (and converging) tech trends

cian 002
video

How to minimize the risks of phishing scams

Employees are often the weakest link in your company's security chain. But with a little knowledge and foresight you can mitigate the risks. In this video, CIO.com senior writer Sharon Florentine explains the anatomy of a phishing...

security consultant cover

What it takes to be a security consultant

The move to security consultant can be rewarding and challenging (in a good way), but be prepared to market and sell yourself and your services

ladybugs

Buggy open source components still dog dev teams

You can write the best code in the world, but if you use vulnerable libraries and frameworks, you're introducing serious security problems to your application

linksys wrt3200acm front 1200

Flaws let attackers hijack multiple Linksys router models

Two dozen Linksys router models are exposed to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over.

Zombie Cloud Data

Don't get bit by zombie cloud data

Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy

Load More