Security

Security | News, how-tos, features, reviews, and videos

ai artificial intelligence ml machine learning vector

youtube thumbnails template
video

How to prep for Windows 7, Server 2008 end of life

Still running Windows 7 or Windows Server 2008? Take these steps to minimize your risk.

youtube thumbnails template 2
video

3 easy ways to make your Windows network harder to hack

Start the new year off by eliminating common paths for attackers to breach your network.

youtube thumbnails template
video

How to fix insecure LDAP binds

Prevent Windows admin credentials from being exposed in cleartext with this tip.

cssg 037 thumb
video

How to get maximum protection from MFA in Office 365

Follow these steps to ensure your multi-factor authentication for Office 365 is effective.

Network World [slideshow] - Top 10 Supercomputers 2018 [slide-01]

Most popular tech stories of 2019

Insider Pro subscribers pick the Top 10 articles published in our debut year.

tt19 063 thumb
video

Top tech stories of 2019

The new Apple Card, the battle for cryptocurrency dominance, cybersecurity skills shortage – just a few of the stories that made headlines in 2019. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp discuss the top tech...

cssg 035 thumb
video

How to make the most of Microsoft’s new Compliance Score Console

This new Microsoft 365 feature can help you stay in compliance with regulations like GDPR and better protect data.

cssg 036 thumb
video

How to protect the enterprise from holiday attacks

Attackers often take advantage of the holidays to launch attacks. Use these Microsoft settings to deter them.

cssg 034 thumb
video

How to secure your domain name services

Follow these steps to protect your websites at the server and workstation.

Secured data transfer 184744560

Microsoft readies new language for safe programming

Soon to be open source, Project Verona takes a different approach to object ownership and concurrency to ensure safe memory management

03 shipping malware

Snake bites: Beware malicious Python libraries

Malware posing as Python libraries is routinely showing up on PyPI, Python’s official package index

sign contract document legal

Contract for the Web wants your endorsement

Backed by the World Wide Web Foundation, Google, and Microsoft, the Contract for the Web seeks a free and open web that works for the public good

cssg 033 thumb
video

How make a Windows disaster recovery kit

Make your own disaster checklist and recovery toolkit before trouble happens.

Binary code / magnifying lens / inspection / analysis

GitHub makes CodeQL free for research and open source

CodeQL is a semantic code analyzer and query tool that can be used to find security vulnerabilities in codebases

tt19 056 thumb
video

Balancing patient security with healthcare innovation | TECH(talk)

Healthcare organizations are one of the most targeted verticals when it comes to cyberattacks. While those organizations must work to secure patients' sensitive data, it can also be helpful to analyze that data to improve patient...

nordvpn

Get 70% off NordVPN Virtual Private Network Service + 3 months free - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 70%, with 3 extra months on top. Use our link and see the discount applied when you click...

cssg 032 thumb
video

How to harden web browsers against cyberattacks

Use these techniques to limit attackers’ ability to compromise systems and websites.

tt19 054 thumb
video

Printers: The overlooked security threat in your enterprise | TECHtalk

Printers, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online’s J.M. Porup discuss the threats to these devices, plus...

Load More