Security

Security | News, how-tos, features, reviews, and videos

data science certification man at computer
Automation  >  An assembly line's robotic arms conveyor belt work with binary code.

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Use of cloud collaboration tools surges and so do attacks

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.

A man using a mobile phone in shadow against a bright wall

Amid the pandemic, using trust to fight shadow IT

With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

6 ways to be more secure in the cloud

If you rely on multiple or hybrid cloud environments to support business processes, you need to be as vigilant protecting data and applications as when they resided on premises.

tech spotlight iot intro by  go unlee gettyimages 1174958392 thinkstock 178457492 3x2 2400x1600

The Internet of Things in 2020: More vital than ever

Just when we needed it most, the internet of things is delivering gobs of data and remote device control across almost every industry, from healthcare to agriculture.

micro segmentation security lock 2400x1600

How secure is Java compared to other languages?

Java is often cited as the most secure programming language. Is it really?

video conferencing / remote work

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?

Malware alert  >  United States Capitol Building

Visual Studio Code extension flags NPM vulnerabilities

Open source Snyk Vuln Cost scans JavaScript packages from NPM for security vulnerabilities as you code

help 139994676

Zeek and Jitsi: 2 open source projects we need now

Long proven but not well known, these network security monitoring and video conferencing tools couldn’t be more timely

youtube thumbnails template 021020
video

How to fight scripting attacks

Most phishing campaigns use links to malicious scripts that infect users’ devices. Here’s how to spot and prevent them from doing damage.

youtube thumbnails template 021020
video

How to prevent data loss on your network

Use these tools and techniques to protect important data from being exfiltrated from your Windows network.

youtube thumbnails template
video

Complying with CCPA: Answers to common questions

Enforcement of the California Consumer Privacy Act begins this summer, but lawsuits are already being filed. To help you comply and avoid being sued, CSO contributor Maria Korolov joins IDG TECH(talk) host Juliet Beauchamp to discuss...

youtube thumbnails template
video

How cyber attackers hide malware on your network

Knowing where to look for malware lurking on your network gives you a better chance to prevent damage from it.

tt20 011 thumb
video

What's the difference between the deep web and the dark web?

We hear the terms "deep web" and "dark web" thrown around a lot... but what do they actually mean? And what's the difference between the two? CSO Online writer J.M. Porup joins Juliet to dispel rumors and discuss what sets the deep...

mobile security / threat detection / traffic analysis

Thirteen rules for developing secure Java applications

Make Java security a top priority at every stage of application development, from class-level language features to API endpoint authorization

IDG Tech Spotlight  >  Security  >  DevSecOps: Bringing security into agile development and CI/CD

How to bring security into agile development and CI/CD

Align to DevSecOps and shift-left security to improve coding practices, eliminate vulnerabilities in development, and deliver highly secure apps to production

IDG Tech Spotlight  >  Security  >  Cybersecurity in 2020: From secure code to defense in depth

Cybersecurity in 2020: From secure code to defense in depth

CIO, Computerworld, CSO, InfoWorld, and Network World tackle the hot security issues, from prioritizing risk to securing digital transformation.

youtube thumbnails template
video

How to check your vulnerability to credential dumping

Use these techniques to see if attackers have harvested authentication credentials from your Windows network.

A network of clouds with binary code.

7 best practices for managing a multi-cloud environment

Multi-cloud strategies and hybrid IT environments bring a set of challenges that technology leaders might not have expected.

Load More