Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

Digital Key, security, encryption
hollywood sign

book safe

45% off Dictionary Hidden Book Safe With Lock - Deal Alert

This very realistic looking dictionary conceals a locking solid steel safe for creatively hiding away your money, prescription bottles, jewelry, small electronics and more. Currently discounted 45%.

tools preventing data leaks 1

Review: Top tools for preventing data leaks

Comodo, Digital Guardian, and Forcepoint provide strong protection for sensitive data

eye spy

Dream on if you think spies will reveal their exploits

Governments will hide and exploit vulnerabilities as long as they can, even if that risks criminals getting their hands on them too

Firefox

Mozilla launches free website security scanning service

Observatory tool checks not for code vulnerabilities but for server configuration options and security mechanisms

checkmate chess

Real-life examples test whether you are prepared for a cyberattack

These tabletop exercises will update your response plan for live action

ios 9.3

Apple patches iOS security flaws found in spyware targeting activist

Government-hired hackers used three previously unknown vulnerabilities in Apple's iOS to target an activist in the United Arab Emirates

20151005 Cisco headquarters sign

Cisco starts patching firewall devices against NSA-linked exploit

Cisco has released some fixed versions of its Adaptive Security Appliance firewalls, and more patches are expected

cloud security

Don't bring your bad security habits to the cloud

Not enough enterprises are using their cloud migrations to finally bring their data security up to snuff

cyber attack stock image

New collision attacks against triple-DES, Blowfish break HTTPS sessions

Legacy ciphers such as triple-DES and Blowfish are vulnerable to Sweet32 attacks, which let attackers decrypt HTTPS sessions even without the encryption key

Apple security

The catch-22 with Apple security

A long, rocky relationship with Apple products and tech support culminates with a tangled up Apple ID -- and a yearning for Linux

video

Security Sessions: The pitfalls of security awareness training

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Bill Rosenthal, CEO of Logical Operations, about what's missing in many security awareness training programs that enterprises often deploy (if...

spotlight

A deeper look at business impact of a cyberattack

Hidden costs can amount to 90% of the total business impact on an organization, and will most likely be experienced two years or more after the event

elctrical plug shock

Side-channel power, the new security front

Power analysis may be a way to secure devices on the internet of things

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

Paranoia rules! 5 types of imaginary malware

Computer security attracts all sorts of skeptical personalities. A little doubt is healthy; a lot may mean you should seek professional help

devops

Automate, integrate, collaborate: Devops lessons for security

Devops is transforming application development; the same principles of automation, integration, and collaboration can vastly improve security as well

clicks pageviews traffic denial of service ddos attack

Poorly configured DNSSEC servers at root of DDoS attacks

Admins need to ensure that their DNSSEC domains are properly set up -- which can be easier said than done

twitter logo shattered glass

Twitter suspends 360,000 accounts for terrorist ties

The social network has suspended 235,000 in last six months alone, with rate of daily suspensions up 80%

NSA headquarters

The NSA's hoard of cyber weapons makes some experts nervous

An alleged hack has raised questions about the agency's practices

Load More