Security

Security | News, how-tos, features, reviews, and videos


data security

6 keys to MongoDB database security

Don’t be the next MongoDB data breach. Close these holes in your MongoDB deployment before it’s too late

tf19 029 thumb2
video

WhatsApp attacked by spyware | TECH(feed)

WhatsApp’s recent spyware hack took advantage of a security vulnerability and allowed attackers to access private, digital communication. In this episode of TECH(feed), Juliet walks through the hack, who was affected and how you can...

cssg 016 thumb
video

How to set up a Microsoft Azure backup process

Setting up a backup process in Azure is one way to quickly recover from a ransomware attack.

thumb
video

Card skimming moves online | TECH(talk)

CSO staff writer Lucian Constantin offers advice on how online retailers can prevent online payment fraud.

qpahy9p 4

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features.

man in boat surrounded by sharks risk fear decision attack threat by peshkova getty

How to eliminate the security risk of redundant data

Most enterprises bring all their redundant data to the cloud, along with the security risk such redundancy creates. Here’s how to fix it

cssg 015 enable auditing
video

How to audit Windows Task Scheduler to detect attacks

Learn how to prevent attackers from using Task Scheduler to hide and set up tasks to access Windows systems.

Industry 4.0 / Industrial IoT / Tablet management of robotics and real time monitoring.

2 security tricks your cloud provider won’t tell you

Security operations (secops) are more effective if you pair them with governance operations (govops) and cost operations (costops)

thumb
video

Huawei’s possible lawsuit, ransomware readiness, old malware resurfaces | TECH(feed)

The ongoing battle between the U.S. and Huawei could soon go to court as Huawei reportedly prepares to sue the U.S. government. Plus, 2019 will see ride sharing companies going public… but which will be first? And as a decade-old...

disheveled business man emerges from the ocean, holding his head

How to address IoT’s two biggest challenges: data and security

The internet of things generates colossal amounts of data from typically unsecure devices. Left as is, either problem could lead to catastrophe

mac3

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike.

1 weakest link broken rusted chain security breach hacked

The cloud’s weakest security links aren’t where you're looking

In all security, your weakest link is your biggest vulnerability. Cloud security is no different

sample of all graphics.00 14 06 21.still001

The race to lock down industrial control systems | Salted Hash Ep 44

Guest host Juliet Beauchamp and CSO senior writer J.M. Porup talk about the challenges around securing the systems and networks used to control industrial plants and infrastructures.

nordvpn

Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now.

industrial iot internet of things smart enterprise

Oracle Java Card updated for IoT applications

Java Card is a software technology providing isolation between secure hardware and software services

sample of all graphics.00 01 51 22.still001

Exploring the economic realities of cybersecurity insurance | Salted Hash Ep 43

Guest host Juliet Beauchamp talks with senior writer J.M. Porup about the newly created cybersecurity insurance industry, and how a policy could fit into an organization's overall security strategy to help minimize risk.

blazing speed leaving a glowing trail along a road

The path to cloud security goes through integration

Making your cloud more secure is about talking to other security systems more than tossing technology at the problem

shipping containers

7 container security tools to lock down Docker and Kubernetes

These extra-strength tools bring monitoring, auditing, runtime defenses, and policy-based controls to containers in development and production

Load More