Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands

Equifax credit bureau logo and building security breach

Equifax hackers may have stolen more data than originally revealed

A document submitted by Equifax to the Senate Banking Committee shows attackers may have also stolen tax ID numbers, additional driver’s license and credit card details, email addresses and phone numbers.

hacker endpoint security vulnerability cyberattack lock

How to approach a Zero Trust security model for your enterprise

Implementing a Zero Trust model to protect your enterprise's critical systems could be worth the trouble.

drowning in red tape bureaucracy ai machine learning

What does the GDPR and the "right to explanation" mean for AI?

Security teams increasingly rely on machine learning and artificial intelligence to protect assets. Will a requirement to explain how they make decisions make them less effective?

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

overwhelmed man stressed analytics information overload

The Importance of Discerning Between Job Burnout and PTSD

It is important to discuss the key differences between PTSD and burnout in order for us to avoid making light of a serious psychological disorder

laptop with charts graphs analytics hot and cold

Security experts must enable safer usage, not just limit unsafe behavior

Keeping the enterprise secure, even when users need to do things that are considered risky behavior.

fragile binary cyberattack risk vulnerable

Why the Fourth Industrial Revolution will require a breakthrough in trust

How enterprises respond to threats can shape success in the digital economy.

stretched money budget

11 tips for prioritizing security spending

How to keep things locked down when you can't afford new locks.

network security digital internet firewall binary code

Defending outside the firewall

The risks and rewards of the intelligent edge.

cyberattack laptop arrows war fight

Kaspersky: Accidental DDoS attacks among top threats

Kaspersky Lab's Q4 2017 DDoS Intelligence Report found most DDoS attacks were sabotage and attempts to cash in on Bitcoin, but some were accidental attacks.

internet security privacy

What is personally identifiable information (PII)? How to protect it under GDPR

The EU's General Data Protection Regulation requires companies to protect the privacy of their EU customers. That means keeping personally identifiable information (PII) safe. Here's what you need to know.

patching against ransomware

The two most important ways to defend against security threats

Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.

new york city 2380683 1920

Cyber NYC boosts the Big Apple's cybersecurity industry

New York City Economic Development Corp. launches Cyber NYC to foster public-private partnerships focused on building a vibrant cybersecurity community and talent pool in the largest U.S. city.

james comey fbi cyberconference

Internal FBI emails indicate White House lied about support for Comey's firing

Over 100 internal FBI emails written by FBI managers indicate the White House "was lying" about people in the bureau supporting Director James Comey's firing.

overwhelmed man stressed analytics information overload

Cybersecurity job fatigue affects many security professionals

Infosec professionals face occupational hazards such as long hours, high stress levels, and career frustration that can lead to mental health issues.

multi tasking project management research analytics data scientist

Security metrics: telling your value story

Security leaders must understand metrics as critical tools to explain how security services support the organization and its strategic objectives.

Salted Hash Ep 17: Spectre and Meltdown, a vehicle that no one is using

Welcome to another episode of Salted Hash. This week, Salted Hash is joined by our new Staff Writer, J.M. Porup, to talk about some recent developments related to Spectre and Meltdown, including patch fixes, future mitigations, and a...

bitcoin currency blockchain finance bank binary

6 use cases for blockchain in security

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection.

steal theft hacker crime laptop firewall

3 leaked NSA exploits work on all Windows versions since Windows 2000

The EternalSynergy, EternalRomance, and EternalChampion exploits have been reworked to work on all vulnerable Windows versions: Windows 2000 -- Server 2016.

security internet network encryption privacy padlock

How to speed up security tool evaluation and deployment

Performing continual security tool evaluations and proofs of concept can be taxing on security teams. Security delivery platforms can greatly simplify the process.

Load More