Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Security (3)

hackers

Bulletproof admin boxes beat the toughest hackers

The best way for hackers to pwn a company is to steal elevated credentials, but Skyport's SkySecure solution sells nearly impenetrable admin boxes

Global economic/technology prospects: China and the United States of America

U.S. readies sanctions against China for cyber spying

Experts question whether the penalties on Chinese companies for economic cyber espionage will have a significant effect

Security

Linux Foundation publishes security checklist to help sysadmins combat attacks

The group has published a new list of recommendations that range from moderate to paranoid

top secret data protection security briefcase caution police tape

Review: How to protect top-secret data

In our tests, IQProtector’s file encryption tool successfully secured corporate documents from prying eyes.

img 0392

The disaster-recovery lessons we learned after Katrina

The hurricane and subsequent flooding knocked many businesses out of commission, but businesses can use their hard lessons to be better-prepared

customer experience

The new IT is all about the customer

Enterprises have turned outward, investing more and more in improving the customer experience -- giving those closer to customers power to make key technology decisions

Adobe Flash is closer to being wiped away

Google, Amazon push Flash closer to extinction

In the name of Internet security, Google and Amazon join the movement to stop Flash ads from displaying

A new version of the sophisticated Duqu malware is used for spying

Researchers find many more modules of Regin spying tool

Researchers from Symantec found 49 new modules for the sophisticated malware program many believe is used by the NSA

Security in cloud computing

BitTorrent patches flaw that could amplify distributed denial-of-service attacks

Attackers could use the vulnerability to force BitTorrent applications used by hundreds of millions of users to send malicious traffic

malware adware

Who can stop malware? It starts with advertisers

Malware masquerading as advertising is a growing problem, and the ad industry must figure out how to weed out scammers from legitimate companies

healthcare it security jobs

More than 80% of health care IT leaders say their systems have been compromised

Only half of IT managers feel they are adequately prepared to prevent future attacks

too close darwin award

Most corporate risk due to just 1% of employees

Just 1 percent of employees are responsible for 75 percent of cloud-related enterprise security risks

measure piece photo

4 security metrics that matter

Today, management demands metrics to get a clearer view of security. Here are four metrics that deliver actionable insight -- and a few others with less value

oracle headquarters

Oracle, still clueless about security

Oracle Chief Security Officer Mary Ann Davidson let loose a long rant about people who dare to look into the security of the company’s products. Oracle quickly backed away from those remarks, but has it faced up to the fact that its...

binary data

Managing data in a mobile and cloud world

A simple strategy for standardizing metadata can improve decision-making, data governance and data security. (Insider; registration required)

Vinton Cerf Heidelberg Laureate Forum

Vint Cerf: 'Sometimes I'm terrified' by the IoT

Strong but finely tuned authentication will be essential to the Internet of things, according to the 'father of the Internet'

usb thumb flash drive stick

Five signs an employee plans to leave with your company's data

By offering early warning indicators, predictive analytics plays a growing role in detection and prevention

open windows with clouds 164757 1280

4 overblown Windows 10 worries

Does Microsoft's new OS really endanger your privacy and security? We examine the four top concerns about Windows 10 -- and what you can do about them

Load More