Data Loss Prevention

Data Loss Prevention | News, how-tos, features, reviews, and videos

Let's Encrypt automated encryption gears
Hands typing on a laptop keyboard binary code and a hazard symbol on screen.

6 small business security

How a small business should respond to a hack

With small business finding itself in hackers’ crosshairs as much as the big boys, it’s imperative to have an immediate response plan in the event of an attack.

Internet of Things (IoT) / security alert / wireless network management

IoT vendors ignore basic security best practices, CITL research finds

New measurements by the CITL mass fuzzing project show just how bad things really are--and how IoT device makers could radically increase binary security with one day of engineering work.

Cloud Security

Cloud security: Inside the shared responsibility model

The Capital One security fiasco has underlined that securing the cloud is both a complicated technology and contractual problem.

VPN / Virtual Private Network  > A mobile phone connecting via VPN / network connections.

Top mobile VPNs for the enterprise

Any of these six VPNs can securely connect mobile devices to your enterprise network if it supports the configuration options you need.

Keep third-party risk on your radar: Piggybacked deer, giraffe and cat balance on a tightrope.

Are you taking third-party risk seriously enough?

Because third parties are often responsible for data breaches, your internal security standards must extend beyond your borders to cover vendors and other external partners.

phishing threat

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

CSO  >  Antivirus digital syringe and virus/biohazard symbol in binary matrix

Best Android antivirus? The top 12 tools

There are plenty of antivirus tools for Android. Here's how the top 12 measure up in protection, usability and features.

blue mother board circuitry computer chip processor harddrive

Insecure virtual USB feature in Supermicro BMCs exposes servers to attack

Security researchers have found a way to attach virtual USB devices remotely to Supermicro servers, including over the internet, by abusing a feature in their baseband management controller software.

secured vpn tunnel

What is Wireguard? Secure, simple VPN still in development

The Wireguard VPN offers better performance and a simpler, effective approach to cryptography. Is it ready for the enterprise?

CSO > silhouettes overlaid with a circular maze / shared perspective / empathy / collaboration

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how several companies have minimized their risk.

8 getting breached is bad for business

What is the cost of a data breach?

Data breach costs can be ongoing for years, a new study finds. Here's the breakdown of costs and advice on how to minimize them.

CSO > Microsoft Azure backups / cloud computing / binary code / data transfer

7 steps to ensure your Azure backup works when you need it

Worried about ransomware attacks? The best thing you can do now is make sure your backup system is ready.

network security / network traffic scanning

Why I’m not sold on machine learning in autonomous security

Some hard realities on the limitations of machine learning in autonomous netsec.

vmware vmworld sharpen focus

Can VMware become a leading cybersecurity vendor?

VMware's recent acquisition of Carbon Black gives the company a strong security foundation to build on.

Capital One  >  hack

Capital One hack shows difficulty of defending against irrational cybercriminals

The motivation of the malicious actor who stole data of more than 100 million people was driven by emotional distress and did not follow traditional hacker patterns.

mobile security threat detection

Can you be mobile AND secure?

Despite the security challenges mobile devices create, there is no going back. Users demand corporate access from their smartphones and companies benefit from this access with increased efficiency, better use of time and improved user...

data center / network servers

6 ways cybercriminals use commercial infrastructure

Whether through fraud or legitimate purchase, cybercriminals increasingly depend on mainstream services to support their activities.

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

Examining and addressing threat detection and response challenges

Cybersecurity teams are fighting fires and still rely on manual processes. Meanwhile, the attack surface continues to grow. Process improvements are needed.

Load More
You Might Also Like