Features

security breach egg reveal locks binary code hacked
phishing threat

binary code, magnifying lens, skull and crossbones

What is malware? Viruses, worms, trojans, and beyond

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

concentric rings of digital security with a lock at the center

Preparing for the day quantum computing cracks public-key cryptography: What to do now

Quantum computers could crack public-key encryption in as little as five years. Here's how to prepare for the post-quantum world.

phishing threat

What are phishing kits? Web components of phishing attacks explained

A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.

primary laptop with certificate degree for technology

Top bachelors and masters cybersecurity degree programs

These are some of the best on-campus and online cybersecurity degree programs helping to meet the cybersecurity job demand.

patch on top of Windows logo

Patching Windows for Spectre and Meltdown: A complete guide

With newly disclosed Spectre and Meltdown variants, it’s time to review the risk they present your Windows systems and the steps needed to patch them.

template c100.00 06 06 01.still001
video

Wi-Charge demos wireless charging over distance

The ability to charge hardware over distances of several meters has always seemed to be something of a pipe dream. But Wi-Charge says the technology works – and actual product shipments could begin early in 2019.

deepfakes fake news tv head manipulation superimposed brainwashed

What are deepfakes? How and why they work

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

face superimposed on keyboard privacy hacker

California Consumer Privacy Act: What you need to know to be compliant

California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.

robot gear automation

Keeping pace with security automation

Stressed and stretched, IT security teams look to automation for relief.

artificially intelligent [AI] virtual assistant / chatbot

The chatbot revolution will (not) be secure

Two blockchain projects hope to prevent bot authentication issues before they start.

cloud security ts

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy.

audit binary compliance magnifying glass investigate

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

cwan 013 6securityreasons win10
video

6 security reasons to upgrade to Windows 10

From advanced authentication to new privacy controls, Windows 10 offers users solid security reasons to upgrade.

cwan 012 6reasons win10
video

6 practical reasons businesses should upgrade to Windows 10

Believe it or not, a large number of businesses haven’t upgraded to Windows 10 yet. Here’s why they should.

nwan 019 virtualization
video

What is virtualization?

In the IT world, virtualization has revolutionized the way we think about data and where it lives, moving us closer to a completely on-demand data world.

Bob Bragdon

Where is Zero Trust today?

Sponsored by Centrify -- Bob Bragdon, Publisher of CSO, gives his impressions of the status of Zero Trust Security and where enterprises stand in their adoption of the model today.

wireless mobile network - internet of things edge [IoT] - edge computing

6 essential elements of edge computing security

Edge computing is fast becoming a new cybersecurity “front line” as users overlook security in their rush to get data and services deployed. Do you have a plan for patrolling the edge?

runners at starting line

5 tips for getting started with DevSecOps

Don't be fooled, integrating security into the DevOps process is a big project. But the payoff is worth the effort. Here's what you need to know to get started building DevSecOps from the ground up.

Load More