Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands

iot security ts

The CSO IoT security basics survival guide

The Internet of Things presents significant security challenges to businesses of all types. Here’s what everyone needs to understand about IoT and its risks.

Movie preview test pattern
Update

Best security software: How 12 cutting-edge tools tackle today's threats

In these security software reviews, we go hands-on with some of the most innovative, useful and, arguably, best security software from today's most important cybersecurity technology categories.

MyHeritage HQ

92 million MyHeritage email addresses found on private server

On Monday, MyHeritage, an online genealogy platform, announced that more than 90 million of their users had email addresses and hashed passwords compromised, after a researcher discovered a file being hosted on a private server.

Security alert for incoming threats.

Review: Seceon soups up standard SIEM

The Open Threat Management Platform essentially acts as both an SIEM and a frontline security appliance. Thrifty firms may want to consider eliminating some of their other cybersecurity programs if they duplicate what the OTM is...

user authentication

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness.

deleting facebook

Facebook gave access to data on users and their friends to 60 device makers

Facebook may have violated a settlement with the FTC and promises made to users, as well as lied to Congress over giving users' complete control of their data.

cloud apps

Cloud functions present new security challenges

Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?

steamstream

Valve patches decade-old bug that made Steam users' PCs vulnerable

Valve patched a 10-year remote code execution bug that could have bitten all Steam clients and allowed attackers to remotely control gamers' computers.

vulnerable gdpr breach security cyber attack

GDPR is here – now what?

Look at the General Data Protection Regulation (GDPR) and the revised Payment Services Directive (PSD2) as opportunities to adopting sound data protection practices.

grant bourzikas mcafee
Q&A

CSO Spotlight: Grant Bourzikas, McAfee

The skills shortage is real, is likely bigger than most estimates suggest, and isn't just about the sheer numbers of people, says Bourzikas. His advice for aspiring IT leaders: emphasize and encourage diversity of thought on your...

Election 2016 teaser - Electronic voting, digital ballot boxes

How elections are hacked via social media profiling

What to expect in the 2018 midterm elections and how malvertising tactics will be used to target voters.

man typing on laptop search internet web browswer

What is Shodan? The search engine for everything on the internet

Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured.

medical heart rate monitor ekg hospital

5 tips to thwart medical device attacks

Medical devices can be an easy gateway for hackers to steal valuable information. This advice will lower the risk of that happening.

survival tools, maps and notebook

CIA contractor secretly hoards his classified work

Former CIA contractor Reynaldo Regis pled guilty to keeping secret notebooks of his work within the CIA from 2006-2016 and storing the notebooks in his home.

blue padlock in circle pixels digital security padlock

The rise of analyst-centric security operations technologies

The shift of technology to meet analyst needs has altered the infosec market -- for the better.

north korea statue pyongyang

FBI, DHS warn of North Korean RAT and worm malware

The U.S. government released an alert about two strains of North Korean malware that are being used by Hidden Cobra.

login password - user permissions - administrative control

Are regulations keeping you from using good passwords?

Most companies are using password "best practices" that are out of date and ineffective. Regulations are getting in the way of changing them.

facebook hallway london headquarters reuters toby melville rtx3l5uy

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection...

thinkstockphotos canada flag

2 Canadian banks hacked, 90,000 customers' data stolen

Bank of Montreal and the Canadian Imperial Bank of Commerce’s Simplii Financial confirmed hackers stole the personal and financial data of thousands of customers.

russian attack missiles

David Jewberg — social engineering the Russia conversation

The David Jewberg persona trolled Russian and Ukrainian media. The question remains: Was it the alter ego of Dan Rapoport or a creation to social engineer the Russian dialog?

Load More