Security

Security | News, how-tos, features, reviews, and videos

Secured data transfer 184744560

03 shipping malware

Snake bites: Beware malicious Python libraries

Malware posing as Python libraries is routinely showing up on PyPI, Python’s official package index

sign contract document legal

Contract for the Web wants your endorsement

Backed by the World Wide Web Foundation, Google, and Microsoft, the Contract for the Web seeks a free and open web that works for the public good

cssg 033 thumb
video

How make a Windows disaster recovery kit

Make your own disaster checklist and recovery toolkit before trouble happens.

Binary code / magnifying lens / inspection / analysis

GitHub makes CodeQL free for research and open source

CodeQL is a semantic code analyzer and query tool that can be used to find security vulnerabilities in codebases

tt19 056 thumb
video

Balancing patient security with healthcare innovation | TECH(talk)

Healthcare organizations are one of the most targeted verticals when it comes to cyberattacks. While those organizations must work to secure patients' sensitive data, it can also be helpful to analyze that data to improve patient...

nordvpn

Get 70% off NordVPN Virtual Private Network Service + 3 months free - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 70%, with 3 extra months on top. Use our link and see the discount applied when you click...

cssg 032 thumb
video

How to harden web browsers against cyberattacks

Use these techniques to limit attackers’ ability to compromise systems and websites.

tt19 054 thumb
video

Printers: The overlooked security threat in your enterprise | TECHtalk

Printers, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online’s J.M. Porup discuss the threats to these devices, plus...

youtube thumbnails template
video

Boeing's insecure networks threaten security and safety

Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup...

cssg 031 thumb
video

How to and why you should disable LLMNR with Windows Server

Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.

ai virtual monitor circuitry binary robot robotic

DeepCode taps AI for code reviews

Cloud service analyzes commits to GitHub or Bitbucket and flags security, performance, logic, and compliance issues

cssg 030 thumb
video

How to double-check permissions post migration from Windows 7

It pays to make sure all permissions in your Windows environment are correct after migrating from Windows 7 or Server 2008 R2. Here’s how to check.

tt19 048 thumb
video

Your best defense against insider threats | TECH(talk)

When employees are your weakest link, companies must have programs in place to prevent them from accidentally or intentionally putting the organization at risk. Watch as TECHtalk hosts Ken Mingis and Juliet Beauchamp discuss various...

product 28970 product shots1

Train to be a certified cyber security professional for just $39

This twelve-course bundle will show you ethical hacking and pen-testing techniques

cssg 029 thumb
video

Microsoft’s Windows, Office 365 advice for secure elections

Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems.

cssg 028 thumb
video

Top enterprise VPN vulnerabilities

Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities.

network of connections / digital matrix

The benefits of security behavior analytics for devops

How TrueFort’s approach to application-centric security monitoring creates a real-time feedback loop for dev, sec, and ops teams

cssg 027 thumb
video

How to safely erase data under Windows

Bitlocker and self-encrypting hard drives can make it easier to erase data so that it cannot be recovered. This is how the “crypto-erase” method works.

Load More