Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands

Pills 168822677

Busted! Cops use fingerprint pulled from a WhatsApp photo to ID drug dealer

Police used a photo sent via WhatsApp and a “pioneering fingerprint technique” to ultimately secure drug convictions against 11 people.

internet security privacy

So far, so good for Symantec customers affected by Google distrust issue

DigiCert CEO John Merrill discusses the implications of Google's plan's to distrust Symantec certificates and what his company has done to help with the impending deadlines.

allscripts health care ransomware bitcoin

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

The actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned.

ransomware

Microsoft network engineer faces charges linked to Reveton ransomware

A Microsoft network engineer was charged with money laundering and conspiracy linked to Reveton ransomware.

allscripts insider pdf primary

Allscripts: Ransomware, recovery, and frustrated customers

The actors behind SamSam launched an attack against Allscripts in January 2018, leaving the company’s customers without access to the services needed to run their medical practices — some for more than a week.

locked binary code and circuits

Why organizations need business-centric data protection

A data protection team can help your enterprise take the best steps towards reducing the business risks and data breaches.

Black Hat 2015

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

CSO slideshow - Insider Security Breaches - Weak link breaks among a larger chain in a network

Microsegmentation evolves into a compensating control security tool

Illumio integrates Qualys data into its security platform to provide real-time vulnerability maps, enabling organizations to implement microsegmentation as a compensating control.

cloud security ts

Cloud security will (and should) dominate the RSA Conference

Cloud computing is a runaway IT train, but cloud security is still messy and immature. RSA should become the place to go for cloud security vision, training, best practices, and technology leadership.

Adobe logo and products reflected in displays.

Adobe’s CSO talks security, the 2013 breach, and how he sets priorities

Brad Arkin has led Adobe's new approach to security and aims to make sure one of history’s biggest data breaches doesn’t happen again.

cyber attack

4 open-source Mitre ATT&CK test tools compared

Any of these tools from Endgame, Red Canary, Mitre, and Uber will get your red team and pentesters started with Mitre's ATT&CK framework.

balint seeber bastille SirenJack

SirenJack: Hackers can hijack emergency alert sirens with a $35 radio and laptop

Emergency alert systems manufactured by Acoustic Technology Inc. can be hijacked and made to play any audio thanks to a vulnerability dubbed SirenJack.

security threats and vulnerabilities

It's only intelligence if you use it

Threat intelligence can be valuable, if you actually have it and you’re prepared to make use of it.

patch

6 steps for a solid patch management process

Patch management is simply the practice of updating software – most often to address vulnerabilities. Although this sounds straightforward, patch management is not an easy process for most IT organizations. Here are the steps you need...

social media multiple logos

Reputational risk and social media: When you're blocked or banned without notice

Businesses depend on sites like Facebook, Twitter, Dropbox, and Apple to interact with customers, promote their messages and store content. One complaint against you can shut you off from those services and damage your brand.

The U.S. Capitol building in Washington

No Congressional background check for IT contractor charged with fraud

Imran Awan was an IT contractor to members of Congress, with access to their email servers, yet not even a basic background check was conducted.

locks on binary code

Software-defined perimeter: Important initiative, ineffective name

A geeky and confusing name doesn’t communicate business, privacy, and security benefits. Instead of software-defined perimeter, I suggest ubiquitous security access services (USAS).

ransomware breach hackers dark web

Ransomware incidents double, threatening companies of all sizes

Ransomware is the most common malware used when it comes to breaches, according to Verizon’s 2018 Data Breach Investigations Report.

data breach thinkstock

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

marionette social engineering

Social engineering: It's time to patch the human

Is there a patch for human stupidity? If you believe the common saying, there isn't. However, Jayson E. Street says there is, and it's time companies started patching their humans. The truth is, technology alone isn't going to save...

Load More