Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

technologies cia wants 1

docker

Docker goes rootless -- and that's a good thing

Containers will no longer have to be run as root in Linux, thanks to a new feature in Docker 1.10

automated security defense protection

Dell BIOS verification extends security focus

Dell is adding BIOS protection to its suite of security protections. One solution handles advanced authentication, encryption, and malware detection along with BIOS verification

cloud security lock

How to secure Amazon Web Services like a boss

Amazon does a great job with infrastructure, but securing your cloud applications and environment is up to you. Here's how

boxkeysafe 1000x393

Box makes it easier for businesses to control encryption of cloud data

The new KeySafe service leverages Amazon's cloud to help companies lock files down

video

A huge X-ray system is scanning entire trucks at Super Bowl 50

A massive truck-based X-ray system and 32-mile ban on drones are two of the security measures in place for Super Bowl 50 in Santa Clara.

dell xps 13

Dell is stepping in to protect the boot layer of PCs, tablets

Dell is deploying a verification tool to ensure the boot layer in PCs and tablets hasn't been hacked

video

What Is Social Engineering?

CSO presents an animated explainer on how data criminals exploit human psychology to gain access to a company's data, rather than by hacking or technical measures.

The Forbidden City in Beijing

China's next five-year plan offers clues about cyber security targets

Is your industry next in line to be targeted by China's government-sponsored hackers?

PatternEx

Startup's security platform uses AI to to learn from human decision making

PatternEx says its Active Contextual Modeling is a form of artificial intelligence

hackers

Security flaws not so critical if admin rights are taken away

Privilege management can be a good workaround while waiting for IT to catch up on patch schedules

data security ts

The battle for Node.js security has only begun

The Node Security Project identifies four primary security issues with Node.js

Average successful hack nets less than $15,000

Survey of cyber attackers shows the majority are motivated by money, but they make a quarter of what a cyber security professional makes

flashlight barn farmer

Decrypt SSL traffic to detect hidden threats

As more enterprises increase the amount of SSL traffic, more criminals are able to hide

threat intelligence secrets sharing

5 steps to make threat intelligence work for you

Determining your top threats is not rocket science -- and the effort will pay off in successful mitigations

The cover of Ruby on Rails book

Ruby on Rails fixes multiple input validation vulnerabilities

Ruby on Rails fixed six vulnerabilities in versions 3.x, 4.1.x, 4.2.x, and Rails 5.0 beta and three in rails-html-sanitizer

patch bandage scissors first-aid kit

Latest Nginx updates address three security flaws

The vulnerabilities in the Web server platform affect systems using the 'resolver' directive

computer bug chip circuit board electronic

Google fixes multiple Wi-Fi flaws, mediaserver bugs in Android

Of the 13 security flaws fixed in the latest update, 11 were rated as either high or critical in severity

coffee foam java

Oracle's Java plug-in move no surprise, but is JavaWS the answer?

Applets may no longer be in vogue, but opinions vary whether Oracle's Java Web Start is a viable alternative

Load More