Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

healthcare it security jobs
too close darwin award

measure piece photo

4 security metrics that matter

Today, management demands metrics to get a clearer view of security. Here are four metrics that deliver actionable insight -- and a few others with less value

oracle headquarters

Oracle, still clueless about security

Oracle Chief Security Officer Mary Ann Davidson let loose a long rant about people who dare to look into the security of the company’s products. Oracle quickly backed away from those remarks, but has it faced up to the fact that its...

binary data

Managing data in a mobile and cloud world

A simple strategy for standardizing metadata can improve decision-making, data governance and data security. (Insider; registration required)

Vinton Cerf Heidelberg Laureate Forum

Vint Cerf: 'Sometimes I'm terrified' by the IoT

Strong but finely tuned authentication will be essential to the Internet of things, according to the 'father of the Internet'

usb thumb flash drive stick

Five signs an employee plans to leave with your company's data

By offering early warning indicators, predictive analytics plays a growing role in detection and prevention

open windows with clouds 164757 1280

4 overblown Windows 10 worries

Does Microsoft's new OS really endanger your privacy and security? We examine the four top concerns about Windows 10 -- and what you can do about them

Startup takes heat over online tool that checks Ashley Madison data

Trustify was accused of spamming email addresses that showed up in the leak

privacy please hotel room

9 steps to make you completely anonymous online

The default state of Internet privacy is a travesty. But if you're willing to work hard, you can experience the next best thing to absolute Internet anonymity

Court: FTC can take action against companies with sloppy cyber security

Hotel chain Wyndham had challenged the FTC's authority to mandate cyber security standards

servers with view

Virtualization doubles the cost of security breach

When a security incident involves virtual machines, the recovery costs double compared to that of a traditional environment

chinese espionage

Chinese spies target US intellectual property

The U.S. economy is losing hundreds of billons of dollars each year to economic espionage, mainly from China, due to a ‘stupefying’ lack of security

ashley madison thumb800

Why corporate security pros should care about the Ashley Madison breach

Fallout from the Ashley Madison breach could lead to a wave of spear phishing

iphone 5 old

Vulnerability in enterprise-managed iOS devices puts business data at risk

A vulnerability in the iOS sandbox for third party applications, like those installed by companies on their employees' devices, can expose sensitive configuration settings and credentials

Chuck Norris

How Apache Ranger and Chuck Norris help secure Hadoop

The Hadoop ecosystem has always been a bag of parts, each of which needs to be secured separately -- at least they did need that, until Apache Ranger came to town

flashlight darkness

Cisco: Flash exploits are soaring

Exploit kits are more successful because enterprises don't patch fast enough

zero balloon

Keep these cyber thug holidays marked on your calendar

Learn these days when cyber thugs attack with even more cunning and fervor, and get ready to respond to related exploitations

young man standing behind large red bullseye target

Akamai: The Internet's aging protocols make juicy targets

The latest wave of Internet attacks doesn't merely involve exploits like cross-site scripting; they also leverage aging protocols with enough volume to jam backbone routers

security companies to watch

10 more security startups to watch

These startups focus on encryption, endpoint protection event analysis, and radio-frequency scanning

Load More