Too many admins spoil your security

May 07, 2013
Never give users more access rights than needed. If you hand out admin privileges like candy, it'll come back to haunt you
Read more »

How to fend off aggressive white-hat hackers

April 30, 2013
Nice little business you have there, but it has vulnerabilities. It would be a shame if anything happened to it. Can I help?
Read more »

5 hot security defenses that don't deliver

April 23, 2013
We'd all love to have a magic bullet to stop hackers, but these five defenses won't do the trick, despite what you've been told
Read more »

Beyond honeypots: It takes a honeytoken to catch a thief

April 16, 2013
Honeypots tell you who's attacking. But to catch individuals -- including suspected insiders -- honeytokens let you home in
Read more »

No honeypot? Don't bother calling yourself a security pro

April 09, 2013
Deploy one of these honeypots and you'll soon find out who's attacking you -- and devise a strong defense to fight back
Read more »

The two steps to radically better security

April 02, 2013
Stop wasting your money and do computer security right with two common-sense practices
Read more »

Ultimate PC security requires UEFI -- and Windows 8 or Linux

March 26, 2013
Hackers can easily 'brick' computers with malicious firmware. UEFI effectively blocks that attack vector and costs nothing
Read more »

The 5 cloud risks you have to stop ignoring

March 19, 2013
Known knowns, known unknowns, and unknown unknowns all lurk in public clouds, but you can stay ahead of the exploits
Read more »

Security will get worse before it gets better

March 12, 2013
The damage caused by threats and the number of Net-dependent critical systems are on the rise. Yet we still haven't created a safer Internet
Read more »

Are you leaking too much of your real life online?

March 05, 2013
Thieves and predators constantly search Facebook, Twitter, and Google+ for telltale information. Think before you post!
Read more »
©1994-2014 Infoworld, Inc.