Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

keyboard user security
security code big data cyberespionage DDoS

employees technology planning data [Computerworld, January-February 2017 - HR IT]

Cyber Resilience 2.0, now shipping

The heads of IT security gathered at a recent Think Tank and agreed on a next generation definition of cyber resilience.

arvay randy CISO University of Utah

University of Utah hires Randall Arvay as CISO

Arvay brings a strong cybersecurity, military and educational background to the chief information security officer role.

black man phone cafe upset

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?

internet of things

Cloudflare wants to secure IoT connections to the internet

Web optimization and security firm Cloudflare launched a service that could allow IoT manufacturers to protect devices from attacks and deploy patches much quicker.

robots

Next-gen IoT botnet Hajime nearly 300K strong

The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the notorious Mirai botnet that devastated some high-profile websites last fall, leading some to think the internet had been broken.

security tools intro slide

9 security tools for the mobile worker

From a webcam cover and laptop lock to a USB port blocker and an encrypted flash drive, we've found some security- and privacy-centered gadgets you will want to keep handy.

1 intro insider threat

Sensitive data often follows former employees out the door

Almost 70 percent of employees take data on their way out. Here's how to stop it.

f 16 fighting falcon

U.S. military wants white-hat hackers to target its cyber security systems

The U.S. Air Force is seeking vetted hackers to probe its public Web sites while a top Pentagon official is considering a similar program to test sensor networks used for HVAC and other physical systems.

ransomware

Failure to communicate helps ransomware prosper

Ransomware is rampant. And a SOURCE Boston 2017 panel agreed one of the major reasons is a lack of communication: It is under-reported, there is not enough information sharing about it, and not enough public awareness.

multifactor authentication

State-of-the-art multifactor authentication (MFA) technologies

Multifactor authentication offers more, better factors/options to protect credentials and data than ever.

shield protection

15 tricks to hold off the hackers

To root out persistent hackers, sometimes you have to get a little creative

Top 4 reasons to become a CISSP

Why IT security pros should join the growing ranks of Certified Information Systems Security Professionals.

owasp

Latest OWASP Top 10 looks at APIs, web apps

The new release of the OWASP Top 10 list is out from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs

threat ransomware response

Present and future ransomware tactics model the past

The way to understand, and avoid, becoming a victim of ransomware is to be prepared, said LEO Cyber Security CTO Andrew Hay. And part of that preparation is to understand its historical roots.

iot security ts

Michael Raggo joins 802 Secure as chief security officer

Mobile and Internet of things security expert Mike Raggo will play a key role in product development.

mri scanner

Medical devices that could put you at security risk

You remember the talk about former Vice President Dick Cheney's pace maker being susceptible to hackers, but here is a list of some lesser known medical devices that can scare the life out of you.

1 measure roi

10 ways CSOs can achieve ROI on a network solution

Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before. Here are 10 points that need to be considered to achieve ROI and deliver payback

wallet man money

Ransomware attacks are taking a greater toll on victim's wallets

The hackers spreading ransomware are getting greedier. In 2016, the average fee to free computers hit with the notorious infection rose to $1077, up from $294 the year before, according to security firm Symantec.

Load More