Advertisement

open faucets leaking binary streams of data

What is DLP? How data loss prevention software works and why you need it

Data loss prevention (DLP) is a set of practices (and products) that ensure that an organization's sensitive or critical data is kept safe.


handshake

10 biggest cybersecurity M&A deals of 2019

This past year has been a very active one for mergers and acquisitions in the cybersecurity industry as companies seek to expand their offerings. What will the 2020 M&A market be like?


5G light trails

Domestic 5G development at core of US communications security plan

New NTIA document outlines White House 5G security goals, which promote home-grown R&D and call for continuous risk assessment and management.


Advertisement

A hand holds a lightbulb swathed in leaves and surrounded by symbols of renewable energy.

Solar power shines light on security for the renewable energy industry

Solar power plants have massive numbers of vulnerable internet-connected devices. It's recent focus on cybersecurity is awakening the rest of the renewable energy industry to the threat.


DDOS attack

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...


binary target

5 tips to protect legacy applications on Windows networks

You're probably running legacy applications somewhere, and attackers see them as vulnerable targets. This advice will harden legacy apps against threats.


USA / United States of America stars + stripes and binary code superimposed over The White House

Bipartisan bill could bring back the White House national cyber director role

Cyberspace Solarium Commission leaders introduce the National Cyber Director Act to reintroduce cybersecurity expertise into the White House.


Binary code data flows through the cracked seal of a vault.

John the Ripper explained: An essential password cracker for your hacker toolkit

One of the oldest password cracking and testing tools, John the Ripper is still an essential pen testing tool.


Glowing blue montage of hand keying in password at ATM

Vulnerable drivers can enable crippling attacks against ATMs and POS systems

Newly discovered vulnerabilities could allow more persistent and destructive attacks on popular models of ATM and POS devices.


A hand moves a pawn through a conceptual maze of circuits. [navigating/negotiating/strategy/tactics]

10 essential negotiation tactics CISOs should know

Lose that winner takes all mentality and build your negotiation muscle with advice from security leaders and negotiation experts.


Advertisement

backdoor / abstract security circuits, locks and data blocks

New Republican bill latest in long line to force encryption backdoors

Here we go again. Senate Republicans push a new bill to mandate "lawful access" to encrypted devices and data. It won't end until law enforcement has better cyber forensics capabilities.


A macro shot at the pixel level of a browser displays 'https' and a glowing lock in the address bar.

6 ways HTTP/3 benefits security (and 7 serious concerns)

HTTP/3 brings improved performance and reliability, along with various security and privacy benefits, but there are some noteworthy challenges.


cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private and hybrid cloud deployments. Here’s advice on the tools, information and organizational structure needed to execute a successful cloud security strategy.


CSO slideshow - Insider Security Breaches - Flag of China, binary code

Data security risks threaten approval of Chinese undersea cable plan

The US government's "Team Telecom" wants to partially deny a proposed undersea cable connection between the US and Hong Kong over surveillance, data theft concerns.


A woman works from home with an abstract binary overlay in the surrounding environment.

Free security resources for work-from-home employees during the COVID-19 crisis

Some security vendors are stepping up to help organizations better protect their networks as employees must suddenly work from home.