Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands

cybersecurity shield and gear image
cloud security ts

wrestlers fighting

How Promisec keeps endpoints in compliance

The Promisec Endpoint Management (PEM) software can be installed completely on-premises and gives visibility, advice, and even remediation help for all kinds of threats, unwanted programs and compliance issues that crop up within...

Black Hat 2015

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

hacker, DDOS, IoT, SkilledAnalysts

Skilled bad actors use new pulse wave DDoS attacks to hit multiple targets

In a new type of DDoS attack, skilled bad actors use pulse wave DDoS assaults to exploit weaknesses in appliance-first hybrid mitigation solutions and pin down multiple targets.

4tb drive

31% off WD 4TB My Passport Portable External USB 3.0 Hard Drive - Deal Alert

Safely store massive amounts of photos, videos and music with this 4TB external drive from WD. Currently priced just $10 higher than its 3TB counterpart with this deal.

Movie preview test pattern

Top security tools of 2017

From deception and endpoint security to cloud security and traffic analysis, we review some of the most innovative and useful security tools from today's most important cybersecurity technology categories.

pexels programming code

Here's why the scanners on VirusTotal flagged Hello World as harmful

Last week, on August 10, a security researcher who goes by the handle "zerosum0x0" posted an interesting image to Twitter, it was the code behind a debug build of an executable. The code was 'Hello World' – the training example used...

keys to access solutions admission movie ticket

What is OAuth? What security pros need to know

The OAuth open authorization framework allows websites and services to share assets among users. It is widely accepted, but be aware of its vulnerabilities.

Malware virus

Kaspersky discovers supply-chain attack at NetSarang

While investigating suspicious DNS requests for a financial institution, researchers at Kaspersky discovered backdoor in recently updated copies of software released by NetSarang, a developer of management tools for servers and...

feedback / survey / questionnaire

Caution advised with information security surveys

Cybersecurity reports based on answers from respondents often produce misleading or inaccurate statistics, and they can lead to industry confusion.

phishing threat

Attackers experimenting with CVE-2017-0199 in recent phishing attacks

Researchers at Trend Micro and Cisco's Talos have identified a new wave of Phishing attacks leveraging CVE-2017-0199, a previously-patched remote code execution vulnerability in the OLE (Windows Object Linking and Embedding) interface...

cyber justice internet law

DOJ demands 1.3 million IP addresses of visitors to Trump protest site

DreamHost is fighting the government's search warrant to identify who visited an anti-Trump site, saying the warrant violates privacy laws and the Fourth Amendment.


Greed drives malevolent insider to steal former employer's IP

An insider leaves to set up his own competitive company, and he accesses his former employer's systems to steal IP and marketing plans — for two years.


The best enterprise anti-virus protection may not be enough

Ransomware and other threats often get through signature-based anti-virus protection, giving it a bad rap. However, anti-virus tools still play an important role in the enterprise security strategy.

non management career paths

Cyber security jobs: Job descriptions and resources for today’s hottest roles

These resources and job descriptions will help cyber security professionals identify the best roles for them and allow employers to better communicate their expectations.

daily stormer

GoDaddy kicks Daily Stormer, which then claimed Anonymous hacked it

Anonymous called BS on Daily Stormer's claim they hacked it, suggesting the hate-spewing site may be having problems finding a new host.

pixabay cybersecurity stock

Security pros choose their top enterprise-class cybersecurity vendors

Cisco, IBM, Symantec and McAfee lead the cybersecurity vendors in mind share, but the race has just begun.

containers port ship boat

Top 5 container mistakes that cause security problems

As enterprises increase their adoption of containers, they are also increasing the number of security mistakes they make with the technology.

tipping point

Network defender innovation: time to throw out the old best practices

We have reached a tipping point, a point in our community’s evolution where the security vendor mambo is no longer sustainable.

Load More