Security

Security | News, how-tos, features, reviews, and videos


tf19 046 thumb update2
video

The latest large-scale data breach: Capital One | TECH(feed)

Just a few days after Equifax settled with the FTC over its 2017 data breach, Capital One announced it was the target of a March attack. Identifying information and bank account numbers are among some of the data breached in the...

cssg 020 thumbpng
video

How an attacker can target phishing attacks

There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you...

cssg 019 thumb
video

How to set up Azure AD to spot risky users

You have several options to set up alerts in Azure Active Directory to help spot risky user behavior.

000.00 00 05 03.still001
video

What is the dark web? And what will you find there?

The dark web may sound ominous, but it’s really a catch-all term for the part of the internet that isn't indexed by search engines. Stay tuned for a guided tour of the web's less mainstream regions.

cssg 018 thumb
video

How to manage Microsoft Windows BitLocker

Use these techniques to inventory your network to determine which devices have BitLocker.

tf19 041 thumb
video

What the FTC’s $5 billion fine really means for Facebook | TECH(feed)

Last week, the Federal Trade Commission hit Facebook with a $5 billion fine for mishandling user data. The fine comes after the FTC’s investigation following the Cambridge Analytica scandal. On this episode of TECH(feed), Juliet...

cssg 017 thumb
video

How to set up Microsoft Cloud App Security

This new add-on will let you set up alerts about suspicious sign-on activity for Office 365 and other cloud apps.

tt19 030 thumb
video

How updates to MongoDB work to prevent data breaches | TECH(talk)

CSO senior writer Lucian Constantin and Computerworld Executive Editor Ken Mingis talk database security and how MongoDB's new field-level encryption takes security to the next level.

tf19 036 thumb2
video

How the Huawei ban could become a security threat | TECH(feed)

We’ve already talked about how the Huawei ban may affect business, but how will it affect security? Google has already warned of security threats should the company be unable to send updates to Huawei’s Android-powered devices. And...

tt19 024 thumb
video

What do recent public SAP exploits mean for enterprises? | TECH(talk)

Recently released public SAP exploits (dubbed 10KBLAZE) could pose a security risk for thousands of businesses. Computerworld executive editor Ken Mingis and CSO Online's Lucian Constantin discuss the fallout of 10KBLAZE, and how...

data security

6 keys to MongoDB database security

Don’t be the next MongoDB data breach. Close these holes in your MongoDB deployment before it’s too late

tf19 029 thumb2
video

WhatsApp attacked by spyware | TECH(feed)

WhatsApp’s recent spyware hack took advantage of a security vulnerability and allowed attackers to access private, digital communication. In this episode of TECH(feed), Juliet walks through the hack, who was affected and how you can...

cssg 016 thumb
video

How to set up a Microsoft Azure backup process

Setting up a backup process in Azure is one way to quickly recover from a ransomware attack.

thumb
video

Card skimming moves online | TECH(talk)

CSO staff writer Lucian Constantin offers advice on how online retailers can prevent online payment fraud.

qpahy9p 4

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features.

man in boat surrounded by sharks risk fear decision attack threat by peshkova getty

How to eliminate the security risk of redundant data

Most enterprises bring all their redundant data to the cloud, along with the security risk such redundancy creates. Here’s how to fix it

cssg 015 enable auditing
video

How to audit Windows Task Scheduler to detect attacks

Learn how to prevent attackers from using Task Scheduler to hide and set up tasks to access Windows systems.

Industry 4.0 / Industrial IoT / Tablet management of robotics and real time monitoring.

2 security tricks your cloud provider won’t tell you

Security operations (secops) are more effective if you pair them with governance operations (govops) and cost operations (costops)

Load More