Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

pt 1 image 3
video

Kaspersky Lab and the Russia connection | Salted Hash Ep 1, Pt 1

Reporters Fahmida Rashid and Steve Ragan talk about antivirus vendor Kaspersky Lab, a Russian-based company that various U.S. agencies have flagged as untrustworthy. Should you use it?

cwtt 002 ep1
video

Tech Talk: Pricey iPhones, intent-based networks, GPS spoofing and smartwatches

Our panel looks at whether smartwatch makers blew it by not focusing on the enterprise, why intent-based networking is the next big thing, whether GPS spoofing is real, and how high is too high when it comes to iPhone prices.

cwtt 002 ep2 pt4 img
video

Will the new iPhone break the $1,000 barrier? | Tech Talk Ep 1, Pt 4

The panelists talk about their pricing predictions for the newest iPhone. Will this be the Apple device that gives consumers sticker shock?

cwtt 002 ep2 pt2 img
video

Why should enterprises care about intent-based networking? | Tech Talk Ep 1, Pt 2

The panelists break down Cisco's intent-based networking strategy, which brings machine learning to the networking realm. Plus, they hash out the ramifications for the security industry.

cwtt 002 ep2 pt3 img
video

GPS spoofing, jamming and real-world threats | Tech Talk Ep 1, Pt 3

The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming.

cwtt 002 ep2 pt1 img 2
video

Is the smartwatch market dead? | Tech Talk Ep 1, Pt 1

Ahead of the latest Apple smartwatch rollout, the panelists debate whether vendors made a mistake introducing smartwatches to consumers first, rather than pursuing the enterprise market.

VMware CEO Pat Gelsinger
video

VMware CEO Pat Gelsinger on building better app defense

VMware CEO Pat Gelsinger talks about distributed encryption between virtual machines and the concept of app defense.

Mingis_on_Tech
video

Mingis on Tech: Android vs iOS – Which is more secure?

Apple's iOS has long had the reputation of being more secure than Android, but that may not necessarily be the case. Here's how to evaluate each side's claims about mobile security.

Blackhat_2017
video

Chasing down leakers fast with ThinAir's asset tracking

Tony Gauda, CEO of ThinAir, talks with CSO senior writer Steve Ragan about how the ThinAir system tracks which users within an organization have seen each piece of data, spotting anomalous information and quickly finding the source of...

Blackhat_2017
video

Do developers care about security?

They certainly do, according to Sarah Gibson, application security consultant at Veracode, who talks with CSO senior writer Fahmida Rashid about the issues around application security, and how having a collaborative security team is...

Blackhat_2017
video

Safeguarding power grids and other critical infrastructure from data leaks

CSO senior writer Steve Ragan talks with cybersecurity experts Krypt3ia and Kodor about how the pair seek out passwords, schematics and other sensitive documents on SCADA control system architectures that shouldn't be available...

Blackhat_2017
video

Bringing behavioral game theory to security defenses

Kelly Shortridge and CSO senior writer Fahmida Y Rashid talk about using behavioral game theory to take advantage of hackers’ mistakes and manipulate the data they think they're receiving. People generally make decisions by either...

Faraday_Blackhat2017
video

Simple tips to keep your devices secure when you travel

CSO security reporters Fahmida Rashid and Steve Ragan share some easy ways to keep your data and devices secure while traveling, even at the Black Hat conference, where active scanning is the norm. (And check out the built-in Faraday...

Blackhat_2017
video

How DevOps and cloud will speed up security

Zane Lackey, CSO and co-founder of Signal Sciences, talks with CSO senior writer Fahmida Rashid about how DevOps and cloud can help organizations embed security into their technology structures, enabling business to move faster.

Blackhat_2017
video

Stop blaming users for security misses

Does the message to users about security need to change? Or does IT need to rebuild infrastructure so users can worry less about security? Wendy Nather, principal security strategist at Duo Security, talks with CSO senior writer...

Mingis_on_Tech
video

Mingis on Tech: How linguistics can help catch cyberattackers

When it comes to tracking down the bad actors behind malware and ransomware, cybersecurity firms are turning to linguists.

the 16 worst data security breaches
video

The 16 worst data security breaches of the 21st century

Some of the largest companies in the U.S. have been targets of hackers, including Yahoo, JP Morgan Chase and TJX. Watch as we detail the top 16 breaches and their overall impact on customers or employees.

1 incident response police tape crime death

The 2 cloud security myths that must die

Too many people treat cloud security as a black-and-white proposition, which risks wasting lots of money or having security gaps—or both

robots [Rog01 / CC BY-SA 2.0]

Google adds Recaptcha API to Android to block the bots

The revised method for distinguishing people from malware bots should make it easier for mobile users to prove they are human

escape tool

24% off Resqme Keychain Car Escape Tool 2-Pack - Deal Alert

Made in the USA and originally developed for first responders, this 2-in-1 safety and survival tool features a blade for cutting a seatbelt and a spring-loaded steel spike for breaking a side window. Keep in on your keychain, or clip...

Load More