Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

NSA headquarters
browsers ie safari opera chrome firefox

Verizon to introduce SDN security feature later this month

The virtualized firewall service, part of Verizon's move into software-defined networking, will allow for more reliable and secure connections from third-party networks

The Web's 10 most dangerous neighborhoods

Ten top-level domains are to blame for at least 95 percent of the websites that pose a potential threat to visitors

Security (3)

Tired of memorizing passwords? A Turing Award winner came up with this algorithmic trick

You'll need to practice ahead of time, but the rest is fairly simple to make your passwords not only easier to manage but also more secure

hackers

Bulletproof admin boxes beat the toughest hackers

The best way for hackers to pwn a company is to steal elevated credentials, but Skyport's SkySecure solution sells nearly impenetrable admin boxes

Global economic/technology prospects: China and the United States of America

U.S. readies sanctions against China for cyber spying

Experts question whether the penalties on Chinese companies for economic cyber espionage will have a significant effect

Security

Linux Foundation publishes security checklist to help sysadmins combat attacks

The group has published a new list of recommendations that range from moderate to paranoid

top secret data protection security briefcase caution police tape

Review: How to protect top-secret data

In our tests, IQProtector’s file encryption tool successfully secured corporate documents from prying eyes.

img 0392

The disaster-recovery lessons we learned after Katrina

The hurricane and subsequent flooding knocked many businesses out of commission, but businesses can use their hard lessons to be better-prepared

customer experience

The new IT is all about the customer

Enterprises have turned outward, investing more and more in improving the customer experience -- giving those closer to customers power to make key technology decisions

Adobe Flash is closer to being wiped away

Google, Amazon push Flash closer to extinction

In the name of Internet security, Google and Amazon join the movement to stop Flash ads from displaying

A new version of the sophisticated Duqu malware is used for spying

Researchers find many more modules of Regin spying tool

Researchers from Symantec found 49 new modules for the sophisticated malware program many believe is used by the NSA

Security in cloud computing

BitTorrent patches flaw that could amplify distributed denial-of-service attacks

Attackers could use the vulnerability to force BitTorrent applications used by hundreds of millions of users to send malicious traffic

malware adware

Who can stop malware? It starts with advertisers

Malware masquerading as advertising is a growing problem, and the ad industry must figure out how to weed out scammers from legitimate companies

healthcare it security jobs

More than 80% of health care IT leaders say their systems have been compromised

Only half of IT managers feel they are adequately prepared to prevent future attacks

too close darwin award

Most corporate risk due to just 1% of employees

Just 1 percent of employees are responsible for 75 percent of cloud-related enterprise security risks

measure piece photo

4 security metrics that matter

Today, management demands metrics to get a clearer view of security. Here are four metrics that deliver actionable insight -- and a few others with less value

oracle headquarters

Oracle, still clueless about security

Oracle Chief Security Officer Mary Ann Davidson let loose a long rant about people who dare to look into the security of the company’s products. Oracle quickly backed away from those remarks, but has it faced up to the fact that its...

binary data

Managing data in a mobile and cloud world

A simple strategy for standardizing metadata can improve decision-making, data governance and data security. (Insider; registration required)

Load More