Attention, 'red team' hackers: Stay on target

Attention, 'red team' hackers: Stay on target

You hire elite hackers to break your defenses and expose vulnerabilities -- not to be distracted by the pursuit of obscure flaws

12/08/15

4 do's and don'ts for safer holiday computing

4 do's and don'ts for safer holiday computing

It's the season for scams, hacks, and malware attacks. But contrary to what you've heard, you can avoid being a victim pretty easily

12/01/15

To catch a thief: Cyber sleuth edition

To catch a thief: Cyber sleuth edition

Several bizarre coincidences led to the pursuit of a suspected fraudster in a shopping mall. It did not end well

11/24/15

7 keys to better risk assessment

7 keys to better risk assessment

When bad guys penetrate a network, too many defenders worry about what they stole rather than how they broke in. Focus on causes! Here's how

11/17/15

Math to the rescue! Try this novel hacking defense

Math to the rescue! Try this novel hacking defense

Can drilling into logs tell you whether you have been -- or are being -- hacked? Yes, if you use advanced math to look for weird variations like Anomaly Detective does

11/10/15

The sorry state of certificate revocation

The sorry state of certificate revocation

Certificates need to be revoked for all sorts of reasons, but the process is so slipshod, some propose an entirely new system. Why not just enforce existing rules instead?

11/03/15

Encryption is under siege. Move to SHA-2 now!

Encryption is under siege. Move to SHA-2 now!

Between new NSA pronouncements and poorly protected hard drives, the crypto world has been turned upside down. One certainty: Switch to SHA-2 ASAP

10/27/15

Freedom or security? Most users have chosen

Freedom or security? Most users have chosen

Think about it: App stores are highly restrictive, and now both mobile and desktop OSes employ stores to bar bad apps

10/20/15

The most important security question to ask users

The most important security question to ask users

You have several options for improving corporate security, but user education is a crucial measure, and it all comes down to one point

10/13/15

Know your threats before you deploy defenses

Know your threats before you deploy defenses

Collecting information about how your organization was compromised in the past may not be fun, but without that step, you'll never do security right

10/06/15

The No. 1 problem with computer security

The No. 1 problem with computer security

Everyone focuses on the wrong threats. You've undoubtedly been breached already, so the key is to collect data that can help you prevent attackers from succeeding again

09/29/15

American ingenuity: Why the U.S. has the best hackers

American ingenuity: Why the U.S. has the best hackers

The United States is No. 1 at hacking, mainly because we're always pushing the limits of what can be done. The proof? U.S. hackers seldom get caught

09/22/15

Catch attackers even when they don't use malware

Catch attackers even when they don't use malware

Many advanced hackers opt to skip the malware and use common admin tools. To detect those sneaks, monitor your network for unusual activity

09/15/15

How to stop your DNS server from being hijacked

How to stop your DNS server from being hijacked

Too many DNS servers enable bad actors to hijack them for DDoS attacks. Here's how to ensure you're not a party to destructive mischief

09/08/15

Bulletproof admin boxes beat the toughest hackers

The best way for hackers to pwn a company is to steal elevated credentials, but Skyport's SkySecure solution sells nearly impenetrable admin boxes

09/01/15

9 steps to make you completely anonymous online

9 steps to make you completely anonymous online

The default state of Internet privacy is a travesty. But if you're willing to work hard, you can experience the next best thing to absolute Internet anonymity

08/25/15

10 years on: 5 big changes to computer security

10 years on: 5 big changes to computer security

In the 10 years since Security Adviser debuted, the threats have changed -- as have the defenses, and no one can argue computer security is safer overall

08/18/15

Make stolen data worthless

Make stolen data worthless

You can't stop intruders from penetrating your network, but with the right DLP solution, you can encrypt stolen data so it can never be used

08/11/15

Bug-free code: Another computer security lie

Bug-free code: Another computer security lie

The computer security industry has a dirty secret: If an 'independent' code review says a product is totally secure, you aren't hearing the full story

08/04/15

7 easy steps to Internet street smarts

7 easy steps to Internet street smarts

The Internet is a lawless place rife with shady characters. Learn to avoid their sleazy ploys and get back home safe

07/28/15

Load More