Security

Security | News, how-tos, features, reviews, and videos

qpahy9p 4

man in boat surrounded by sharks risk fear decision attack threat by peshkova getty

How to eliminate the security risk of redundant data

Most enterprises bring all their redundant data to the cloud, along with the security risk such redundancy creates. Here’s how to fix it

cssg 015 enable auditing
video

How to audit Windows Task Scheduler to detect attacks

Learn how to prevent attackers from using Task Scheduler to hide and set up tasks to access Windows systems.

Industry 4.0 / Industrial IoT / Tablet management of robotics and real time monitoring.

2 security tricks your cloud provider won’t tell you

Security operations (secops) are more effective if you pair them with governance operations (govops) and cost operations (costops)

thumb
video

Huawei’s possible lawsuit, ransomware readiness, old malware resurfaces | TECH(feed)

The ongoing battle between the U.S. and Huawei could soon go to court as Huawei reportedly prepares to sue the U.S. government. Plus, 2019 will see ride sharing companies going public… but which will be first? And as a decade-old...

disheveled business man emerges from the ocean, holding his head

How to address IoT’s two biggest challenges: data and security

The internet of things generates colossal amounts of data from typically unsecure devices. Left as is, either problem could lead to catastrophe

mac3

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike.

1 weakest link broken rusted chain security breach hacked

The cloud’s weakest security links aren’t where you're looking

In all security, your weakest link is your biggest vulnerability. Cloud security is no different

sample of all graphics.00 14 06 21.still001

The race to lock down industrial control systems | Salted Hash Ep 44

Guest host Juliet Beauchamp and CSO senior writer J.M. Porup talk about the challenges around securing the systems and networks used to control industrial plants and infrastructures.

nordvpn

Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now.

industrial iot internet of things smart enterprise

Oracle Java Card updated for IoT applications

Java Card is a software technology providing isolation between secure hardware and software services

sample of all graphics.00 01 51 22.still001

Exploring the economic realities of cybersecurity insurance | Salted Hash Ep 43

Guest host Juliet Beauchamp talks with senior writer J.M. Porup about the newly created cybersecurity insurance industry, and how a policy could fit into an organization's overall security strategy to help minimize risk.

blazing speed leaving a glowing trail along a road

The path to cloud security goes through integration

Making your cloud more secure is about talking to other security systems more than tossing technology at the problem

shipping containers

7 container security tools to lock down Docker and Kubernetes

These extra-strength tools bring monitoring, auditing, runtime defenses, and policy-based controls to containers in development and production

to do list

Cloud security: The essential checklist

Are you trying to figure out security for your cloud deployment? You need these five types of security features in place

rawpixel com 296621 unsplash

Download Malwarebytes Today and Protect Your Data for Free

This innovative cybersecurity software helps you fight hackers, and it’s free.

screen shot 2018 09 21 at 10.43.22 am

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year.

10 cloud security breach virtualization wireless

How the cloud has made you more secure

While many still believe that the cloud is less secure, the reality is that your data is safer now due to the cloud—and the cloud has changed the security game for all types of systems

thumbnail
video

How to use the Shodan search engine to secure an enterprise's internet presence

Shodan, a search engine for all ports within the internet, can help enterprises identify and lock down security vulnerabilities. Senior writer J.M. Porup and content producer Juliet Beauchamp talk through the security scenarios.

Load More