Advertisement

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Microsoft accidentally exposed 250 million customer support records online

Even Microsoft isn’t immune to security blunders due to misconfigured databases.  Microsoft today revealed it had briefly exposed its internal customer support database on the web, potentially giving anyone access to over 250...


Microsoft Windows 7 security patches/updates

How to implement Windows 7, Server 2008 security updates after end-of-life

Microsoft has ended support for Windows 7 and Windows Server 2008, but you can purchase extended security updates. Here's what you need to do to implement them.


Overflow  >  Pouring more binary water into a glass than it can hold causing overflow.

What is a buffer overflow? And how hackers exploit these vulnerabilities

A buffer overflow or overrun is a memory safety issue where a program does not properly check the boundaries of an allocated fixed-length memory buffer and writes more data than it can hold. This causes data to overflow to adjacent...


Advertisement

CSO Exectutive Sessions
CSO Executive Sessions

Episode 1: Tracking privacy from a risk standpoint

Podcast Episode 1: Listen now as Ken Foster, head of global cyber risk governance at First Data, discusses how privacy now carries with it a risk weight that has to be part of every conversation around policies and standards. But...


New Google Chromebooks to get 8 years of security and feature updates

As Microsoft kills off free Windows 7 support, Google has announced that all new Chrome OS-based Chromebooks from 2020 and beyond will get eight years of security and feature updates.  Google announced the increased support...


Brexit / GDPR  >  Cutting connections / United Kingdom / European Union / global security shield

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible.


3 patch training update software band aid laptop with virus binary

Citrix issues ADC patch amid new attacks, pushes forward more patches

US enterprise virtualization firm Citrix has shipped patches for a critical vulnerability that is being actively exploited and accelerated additional patches for other affected products.  The first round of patches arrives amid...


ip welcome to insider pro primary by Laurence Dutton getty

Welcome to Insider Pro

For more than 50 years, IDG has earned the trust of its readers with authoritative coverage of the technology industry. Insider Pro is the natural evolution of the insightful coverage our publications have produced for decades.


Multiple individual cloud instances / cloud deployments

How Adobe monitors cloud deployments to control shadow IT

Keeping an eye on your cloud deployments is key to preventing yet another data breach. Adobe's MAVLink program does just that.


data architecture

Data on the rise: 4 new challenges security must master

Data is information security's bread and butter, but the rise of data brings both new challenges and new opportunities. To meet them, security needs to change its relationship with data.


Advertisement

Desktop PC Illustration with a white umbrella and thunderstorm [cyber secruity/ cyber protection]

Why we need to help users be better protected at home?

You have a great security platform, well harden systems, regular updates regime and a very effective security awareness program with both classroom-style training and online training for your users. You are smashing it and making...


cyber security abstract wall of locks padlocks

The week in security: Digging in for a more-secure 2020

Now that you’re probably back to work and stuck in annual planning meetings, you’ll be thinking a lot about your key priorities – and, indeed, about just what cybersecurity is – to ensure that you improve your cybersecurity...


Abstract businessman connected to wired spheres.

Technology can do more than make life easier. It can make us all better people.

At its most basic level, the purpose of technology is to make life easier. Despite the occasional frustrations we all experience, there is little doubt it does so. But what is often overlooked is the impact it can have on our...


CSO  >  Digital identity  >  personal identity / recognition + access authentication / personal data

Defining identity and trust in today’s digital world

While the concept of ‘identity’ has become a critical element in an increasingly digital world, defining exactly what it is remains an ongoing challenge. This is odd because when it comes to effective cybersecurity, having a valid...


facial recognition - biometric security identification

3 reasons you can’t fight facial recognition

The biometric backlash is but a brief blip. Resistance is futile. You WILL be identified. But is that good or bad?