Software

Software | News, how-tos, features, reviews, and videos

CSO  >  Searching for vulnerabilities  >  Magnifying lens in a virtual interface idnetifies weakness
free online course education certification book hybrid laptop and book elearning by nosua getty

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

Review: LogRhythm takes SIEM to the next level

LogRhythm Enterprise offers a lot of protection and assistance for finding and remediating threats … and sometimes even pre-threat actions.

tt19 025 thumb
video

WWDC's biggest enterprise takeaways | TECH(talk)

Apple's recent developer conference, WWDC, had the longest keynote in recent memory. From Memojis to the new Mac Pro, Apple unveiled all types of new tech. But what updates are most important for enterprises? TECH(talk) host Juliet...

thumb
video

Financial services embraces AI | TECH(talk)

With artificial intelligence (and machine learning) showing up in numerous industries, it's no surprise they're now gaining traction in financial services. Coming soon to a banking chatbot near you....

thumb
video

Slack Frontiers 2019 | TECH(talk)

At its Frontiers event this week, Slack rolled out tweaks to its popular collaboration platform – all of them aimed at helping users get their jobs done easier. Most notably, the company is looking to connect Slack with email.

ifcr 024 thumb3
video

How to reshape data with tidyr’s new pivot functions

See examples of tidyr’s new pivot_longer and pivot_wider functions.

Mousetrap and cheese, seen floor-level from the perspective of the mouse.

Review: Fidelis Deception breathes life into fake assets

Today's skilled hackers know, or at least suspect, that deception is in place and won't blindly follow breadcrumbs to fake assets. To combat this, Fidelis Deception creates realistic, living deception assets.

Artificial Intelligence robotic in wheat field

11 questions to ask before buying AI-enabled security software

Infosec is complicated enough. Add AI/ML into your security software mix, and you may be asking for trouble. Or, choose the right vendor, and you could wind up with the best toys on the block. Here's what you need to know to wind up...

tt19 013 thumbnail
video

What's new in Windows 10 version 1903? | TECH(talk)

With the next version of Windows 10 set to appear this spring, it’s a good time to take a look at what’s new and what’s changed in version 1903. (Not much, actually.) But that’s a good thing, according to Computerworld contributing...

security automation robot protects defends from attack intrusion breach

Review: JASK ASOC isn't just another overloaded SIEM

The JASK Autonomous Security Operations Center coordinates various alerts and events into a picture of an ongoing threat or attack — the kinds of techniques that human threat hunters employ, only much faster.

Facebook / privacy / security / breach / wide-eyed fear

Facebook secretly paid users $20 a month to use VPN spying app

After it was revealed that Facebook secretly paid people to use the Facebook Research VPN app, the social media site pulled the iOS version. But the Android version will continue.

tt19 002 thumbnail
video

Collaboration software is on the move in 2019

The year started off with a bang for several companies that make collaboration software. Here's what's been going on with Microsoft Teams, G Suite and others since the start of 2019.

finger on keyboard with email icons floating out of monitor

Review: GreatHorn offers a better way to secure enterprise email

GreatHorn takes a modern and highly effective approach to protecting enterprise email that goes well beyond the capabilities of legacy mail scanners.

nordvpn

Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now.

image2 1

Hook Up Your Business with Award-Winning Video Conferencing For As Little As $19.99/mo

RingCentral offers comprehensive, affordable packages for any size organization, and you can set it up in minutes for as low as $19.99 per month.

binoculars forecast spy privacy hacker watching

Review: AttackIQ FireDrill watches the watchers

This penetration testing tool is configured to operate from the inside, with the primary goal of identifying flaws, misconfigurations and outright shortcomings in all other cybersecurity defenses.

login password - user permissions - administrative control

Using a password manager: 7 pros and cons

This veteran security pro feels more secure now that he's using a password manager, but there are still risks.

detective with magnifying glass

5 open source intrusion detection tools that are too good to ignore

Everyone should employ an intrusion detection system (IDS) to monitor their network and flag any suspicious activity or automatically shut down potentially malicious traffic. We look at five of the best open source options.

me and others flow 1

5 reasons eSignatures are the must-have tool you don't think about

Many companies boast about going entirely digital, but continue to work with mountains of documents. Don't be that company.

Load More