Security

Security | News, how-tos, features, reviews, and videos

security vulnerabilities / risk assessment

What is enterprise risk management? How to put cybersecurity threats into a business context

Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.

abstract data statistics

Top cybersecurity facts, figures and statistics for 2018

Looking for hard numbers to back up your sense of what's happening in the cybersecurity world? We dug into studies and surveys of the industry's landscape to get a sense of the lay of the land—both in terms of what's happening and how...

4 silent skeptic

Silence is not golden

How a mismanaged incident response could cost Google more than a social network.

missiles

Pentagon's new weapon systems are easy to hack, GAO report finds

A recent GAO report revealed that some US Department of Defense weapon systems use default passwords and that a port scan can cause weapon systems to fail.

google logo black

RIP Google Plus: Shutdown announced after API bug exposes 500,000 users' details

The end is near for Google Plus -- August 2019 -- after an API bug exposed 500,000 users’ details and Google chose not to disclose the breach for six months.

Artificial intelligence and digital identity

What is IAM? Identity and access management explained

IAM products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

cybersecurity startup tablet with rocket lifting off startup

7 best practices for working with cybersecurity startups

Security startups are often ahead of the technology curve and can provide more personalized service. Here's how to find the best of them and minimize risks.

facebook portal

Facebook wants you to put a Portal camera and microphone in your home

Facebook's Portal camera doesn't have end-to-end encryption, which could make it handy for police to tap your video calls.

security threats and vulnerabilities

Why I don’t believe Bloomberg’s Chinese spy chip report

China can and has stolen the information it wants from US companies without using secretly embedded hardware, so why would it jeopardize its massive semiconductor industry?

7 boss asks for the impossible steam coming out of womans ears angry blow a gasket

Microsoft yanks Windows 10 Update after it reportedly deleted users’ files

Microsoft pulled Windows 10, Version 1809 for deleting users’ files. Meanwhile, US companies deny Chinese spy chips were added to their servers, and the Justice Department indicted 7 Fancy Bear hackers.

1 intro security executive thinking woman face binary

Splunk lays out its cybersecurity vision

At Splunk .Conf 2018, we learned how the company continues to expand its cybersecurity footprint, work with industry partners, and commit to customer success.

login password - user permissions - administrative control

Using social media for authentication: 3 pitfalls to avoid

Logging into business systems with social accounts comes with certain risks. Here's what you need to know.

wrenches in different sizes / an iterative process of development or repair

10 essential enterprise security tools (and 11 nice-to-haves)

Do you have the right tools to handle a changing threat landscape, tougher regulatory climate, and increasing IT infrastructure complexity? Here are the must-have security tools for meeting today's challenges.

medical network h/ ealthcare IoT / hospital connections and communications

Securing connected medical devices: Will categorizing them as ICS help?

Now that they’re no longer protected by an “air gap,” let’s consider what’s needed to protect connected medical devices from security threats.

ransomware

Recipe Unlimited denies ransomware attack, despite alleged ransom note

Recipe Unlimited denies a ransomware attack impacted nine restaurant brands, despite an alleged ransom note that shows the bitcoin ransom demand ticking up daily.

monitoring systems

Will your company be valued by its price-to-data ratio?

The job of every security professional is to protect their organization’s price-to-data ratio. In the past, it was typically the Sales and Marketing teams in the hot seat driving a company’s valuation by maintaining sales goals to...

keys authentication

What is the future of authentication? Hint: It’s not passwords, passphrases or MFA

Passphrases and MFA are not password saviors. Ultimately, authentication will rely on algorithms to determine user identity and detect fraudulent actions.

bruce schneier book click here to kill everybody security in the hyper connected world

Bruce Schneier's Click Here to Kill Everybody reveals the looming cybersecurity crisis

Everything is broken, and government and corporations like it that way. But when people start dying because of insecure cyberphysical systems, the overreaction from panicked policymakers could be worse than after 9/11.We need to solve...

medical records 155235444

Gwinnett Medical Center investigating possible data breach

After being contacted by Salted Hash about a possible data breach, Gwinnett Medical Center, a not-for-profit network of healthcare providers in Gwinnett County, Georgia, has confirmed they're investigating what the healthcare provider...

blackvue dashcam gps mapped locations

BlackVue dashcams share cars' mapped GPS locations, stream video feeds and audio

Thanks to default cloud settings, BlackVue dashcam customers may be live-streaming video and audio from their vehicles, as well as having their location mapped.

Load More