Security

Security | News, how-tos, features, reviews, and videos

ai robotics mathematics equation analytics virtual screen

HP gives software robots their own IDs to audit their activities

What are your robots up to? HP's new in-house Digital ID for software robots, a CSO50 award winner, makes it easier to keep track of robotic process automation (RPA).

security display showing  biometric processing

What is biometrics? And why collecting biometric data is risky

Biometric authentication uses physical or behavioral human characteristics to digitally identify a person to grant access to systems, devices or data. It has the potential to make authentication dramatically faster, easier and more...

Android robot and gears emerging from isometric mobile phone screen

Android phones can be hacked remotely by viewing malicious PNG image

Android users are being told to patch their Android OS Nougat (7.0), Oreo (8.0) and Pie (9.0) as soon as updates are available after a bug related to PNG images was found.

big brother privacy eye data breach security binary valerybrozhinsky getty

Have we reached peak privacy? How good IAM and privacy can coexist

Why privacy needs to remain at the forefront of identity and access management.

07 surveys

How polls are hacked: What every business should know

The recent revelation that Michael Cohen paid to rig a presidential primary poll underscores the risks they present to business. Here's how to identify and prevent poll rigging.

Cloud Security

CrowdStrike Store opens its endpoint security agent to other vendors

CrowdStrike will share data its cloud-based endpoint security platform collects to give customers more options while minimizing compatibility and performance concerns.

phishing threat

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

mac3

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike.

security threats and vulnerabilities

What is an advanced persistent threat (APT)? And 5 signs you've been hit with one

An advanced persistent threat (APT) is a cyberattack executed by criminals or nation-states with the intent to steal data or surveil systems over an extended time period. Here's how to know if you've been hit with one.

intro security vulnerability

Cyber risk management: There's a disconnect between business and security teams

Business managers want real-time cyber risk management metrics, but cybersecurity teams can only deliver technical data and periodic reports. That gap needs to close.

3 patch training update software band aid laptop with virus binary

Bank OZK's vulnerability risk index shows patching priorities everyone understands

Explaining vulnerability risk to non-technical executives can be hard. With his CSO50 award-winning Vulnerability Exception Risk Index, Bank OZK CISO Jason Cathey has devised a way to turn vulnerability data into a simple risk metric....

9 screen locking device lock down authentication

Power LogOn offers 2FA and networked password management for the enterprise

This authentication tool is simple to set up and use, but the biggest selling point might be workable password management across the enterprise.

fight shadow

Vendor allegedly assaults security researcher who disclosed massive vulnerability

A security researcher alleges the COO of Atrient assaulted and threatened him after disclosing a massive vulnerability in an Atrient product.

5 gdpr compliant notification documentation

Report: Over 59,000 GDPR data breach notifications, but only 91 fines

The low number of fines relative to the volume of reported breaches might be due to over-extended regulators, says a DLA Piper report.

10 threat landscape apocalypse ruins

Add cybersecurity to Doomsday Clock concerns, says Bulletin of Atomic Scientists

The Doomsday Clock, once a ritual feature of the Cold War, warns that cybersecurity issues like IoT and cyber-enabled information warfare endanger humanity.

Windows security and protection [Windows logo/locks]

How to harden Windows 10 workstations and servers: Disable SMB v1

Early versions of Server Message Block are still present on many Windows networks and devices, leaving them open to attack. Here's how to detect and disable them.

Nest Secure

Nest Secure had a secret microphone, can now be a Google Assistant

The Nest Secure system had secret microphone that can now make the Nest Guard security hub double as Google Assistant device.

6 handling email phishing

Phishing has become the root of most cyber-evil

Phishing has become the top cause of data breaches. But with employee education and the right tools, such breaches can be prevented.

one lightbulb glowing among a pack of unlit bulbs

RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

Take note of these startups. Innovation Sandbox has been around for 15 years. A whopping 42 percent of finalists from its first ten years have been acquired. Finalists in the past five years have received $1.5B in funding.

risk assessment - safety analysis - security audit

How ADP identifies and reduces third-party risk

CSO50 award winner ADP's third-party assurance program helps it manage and mitigate risks posed by suppliers and contractors.

Load More