Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

top secret data protection security
img 0392

customer experience

The new IT is all about the customer

Enterprises have turned outward, investing more and more in improving the customer experience -- giving those closer to customers power to make key technology decisions

Adobe Flash is closer to being wiped away

Google, Amazon push Flash closer to extinction

In the name of Internet security, Google and Amazon join the movement to stop Flash ads from displaying

A new version of the sophisticated Duqu malware is used for spying

Researchers find many more modules of Regin spying tool

Researchers from Symantec found 49 new modules for the sophisticated malware program many believe is used by the NSA

Security in cloud computing

BitTorrent patches flaw that could amplify distributed denial-of-service attacks

Attackers could use the vulnerability to force BitTorrent applications used by hundreds of millions of users to send malicious traffic

malware adware

Who can stop malware? It starts with advertisers

Malware masquerading as advertising is a growing problem, and the ad industry must figure out how to weed out scammers from legitimate companies

healthcare it security jobs

More than 80% of health care IT leaders say their systems have been compromised

Only half of IT managers feel they are adequately prepared to prevent future attacks

too close darwin award

Most corporate risk due to just 1% of employees

Just 1 percent of employees are responsible for 75 percent of cloud-related enterprise security risks

measure piece photo

4 security metrics that matter

Today, management demands metrics to get a clearer view of security. Here are four metrics that deliver actionable insight -- and a few others with less value

oracle headquarters

Oracle, still clueless about security

Oracle Chief Security Officer Mary Ann Davidson let loose a long rant about people who dare to look into the security of the company’s products. Oracle quickly backed away from those remarks, but has it faced up to the fact that its...

binary data

Managing data in a mobile and cloud world

A simple strategy for standardizing metadata can improve decision-making, data governance and data security. (Insider; registration required)

Vinton Cerf Heidelberg Laureate Forum

Vint Cerf: 'Sometimes I'm terrified' by the IoT

Strong but finely tuned authentication will be essential to the Internet of things, according to the 'father of the Internet'

usb thumb flash drive stick

Five signs an employee plans to leave with your company's data

By offering early warning indicators, predictive analytics plays a growing role in detection and prevention

open windows with clouds 164757 1280

4 overblown Windows 10 worries

Does Microsoft's new OS really endanger your privacy and security? We examine the four top concerns about Windows 10 -- and what you can do about them

Startup takes heat over online tool that checks Ashley Madison data

Trustify was accused of spamming email addresses that showed up in the leak

privacy please hotel room

9 steps to make you completely anonymous online

The default state of Internet privacy is a travesty. But if you're willing to work hard, you can experience the next best thing to absolute Internet anonymity

Court: FTC can take action against companies with sloppy cyber security

Hotel chain Wyndham had challenged the FTC's authority to mandate cyber security standards

servers with view

Virtualization doubles the cost of security breach

When a security incident involves virtual machines, the recovery costs double compared to that of a traditional environment

chinese espionage

Chinese spies target US intellectual property

The U.S. economy is losing hundreds of billons of dollars each year to economic espionage, mainly from China, due to a ‘stupefying’ lack of security

Load More