Security

Security | News, how-tos, features, reviews, and videos

to do list
rawpixel com 296621 unsplash

screen shot 2018 09 21 at 10.43.22 am

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year.

10 cloud security breach virtualization wireless

How the cloud has made you more secure

While many still believe that the cloud is less secure, the reality is that your data is safer now due to the cloud—and the cloud has changed the security game for all types of systems

thumbnail
video

How to use the Shodan search engine to secure an enterprise's internet presence

Shodan, a search engine for all ports within the internet, can help enterprises identify and lock down security vulnerabilities. Senior writer J.M. Porup and content producer Juliet Beauchamp talk through the security scenarios.

1 network internet connected grid earth power satellite view

How to secure your Azure network

Connected virtual machines need the same kind of security and network management tools as your own data center

thumbnail
video

Talking DerbyCon, spy chip whispers and Google's data breach | Salted Hash Ep 47

Steve Ragan and J.M. Porup catch up post-DerbyCon conference to discuss psychological issues in the infosec community, supply chain security and whether it's time to make China the boogeyman again, as well as Google's recent data...

thumbnail
video

Regulating the IoT: A conversation with Bruce Schneier | Salted Hash Ep 49

Security expert and author Bruce Schneier talks with senior writer J.M. Porup about that widespread use of connected chips -- allowing hackers to access cars, refrigerators, toys and soon, even more home consumer items.

thumbnail2
video

How secure are electronic voting machines? | Salted Hash Ep 48

With the midterm elections looming, electronic voting machines are getting increased scrutiny. J.M. Porup, senior writer at CSO, sits in the hosts chair this episode, breaking down the security risk with content producer Juliet...

template c100.00 04 14 02.still001
video

Mingis on Tech: Data breaches in a world of 'surveillance capitalism'

Facebook and Google recently acknowledged data breaches affecting millions of users. This won't be the last time that happens. CSO's J.M. Porup and Computerworld's Ken Mingis examine what's really going.

08 terror

Cloud misconfiguration: The security threat too often overlooked

I’m seeing a lot of cloud configuration errors in the real world—and it’s scaring the hell out of me

13 ssl

How to enforce SSL in ASP.Net Core

Take advantage of HTTPS and the HSTS security enhancement to encrypt web client and server communications in your ASP.Net Core applications

elephant big data analytics hadoop

How to secure your PostgreSQL database

Follow these steps to enable SSL connections and properly configure user privileges to keep your database secure

globe and abstract data points

How enterprise knowledge graphs can proactively reduce risk

Incorporating knowledge graphs with artificial intelligence offer newfound ability to seek out data security threats instead of simply reacting once noncompliance or data losses occurs

09 backups

Replication isn’t data protection. Here’s why

Despite replication increasing in usage over traditional backup workflows, it’s not enough to protect your data alone

linus torvalds

Linus Torvalds: Changes in hardware change Linux development

Bugs are getting more esoteric, and hardware isn’t getting faster at the same pace it used to

template c100.00 01 59 12.still001
video

VirusTotal Intelligence, a search engine for malware | Salted Hash Ep 45

In this episode, host Steve Ragan talks with Karl Hiramoto, technical solutions consultant for VirusTotal, maker of VirusTotal Intelligence, a searchable detection tool for malware.

cloud security ts

How to retrofit the cloud for security: 2 essential steps

You should build security into every enterprise-to-cloud migration. But if you didn’t do that, here’s how to reduce the risk after the fact

template c100.00 06 50 01.still001
video

Detecting bot attacks | Salted Hash Ep 44

In this episode, host Steve Ragan talks with Engin Akyol, CTO at Distil Networks at the Black Hat 2018 conference, about bot account takeovers and how they can be detected.

Two-sided hybrid face and hands

How hybrid IT impacts identity management

Hybrid IT is disrupting and complicating many processes in organizations. What impact does hybrid IT have on identity management?

Load More