Features

boardroom job opening executive in silhouette empty chair new job

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness.

6 password

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

nycrr cybersecurity gavel regulation compliance law nyc statue of liberty

What is the New York Cybersecurity Regulation? What you need to do to comply

Officially called 23 NYCRR 500, this regulation requires financial services firms doing business in New York to have a full security risk assessment and plan.

iot security ts

The IoT security survival guide

The internet of things presents significant security challenges to businesses of all types. Here’s what everyone needs to understand about IoT and its risks.

user authentication

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness.

cloud apps

Cloud functions present new security challenges

Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?

man typing on laptop search internet web browswer

What is Shodan? The search engine for everything on the internet

Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured.

medical heart rate monitor ekg hospital

5 tips to thwart medical device attacks

Medical devices can be an easy gateway for hackers to steal valuable information. This advice will lower the risk of that happening.

facebook hallway london headquarters reuters toby melville rtx3l5uy

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection...

ransomware

What does a ransomware attack cost? Beware the hidden expenses

The ransom is only a tiny portion of the total cost of a ransomware attack. Consider these associated costs when estimating the total damage.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

mobile connection endpoint protection

5 top trends in endpoint security for 2018

Endpoint security is a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones on their networks to keep out malware and intruders. Let's look at what the year ahead has in store.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier.

security risks in the IoT [internet of things] network

The 5 best malware metrics you can generate

Are you asking the right computer security questions? If you can answer these five, you'll know better how to secure your organization.

Windows security and protection [Windows logo/locks]

Microsoft locks down Windows 10 with the S edition

New security features and limits on what you can load and customize promise to make Microsoft Windows 10 S the more secure version ever. It might not be for everyone, though.

keys authentication

How risk-based authentication has become an essential security tool

A new generation of risk-based authentication (RBA) products can improve both customer experience and security. Here's what to look for in them.

group chat services - Telegram

What is Telegram and is it secure?

The Telegram messaging app has grown in popularity since its launch in 2013, but not without controversy.

honey jar honeypot

Honeypots as deception solutions: What to look for and how to buy

Commercial and open source honeypot tools are now effective deception solutions. Here's what you need to know before implement them.

1 intro security salaries

7 highest-paying IT security jobs, 2018

IT security is of major concern to all organizations, and they're willing to pay to get top talent. Are you being paid what you are worth? Take a minute to check.

eye on computer monitor showing privacy security or breach

How privacy is moving data security to the top of corporate agendas

It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.

Load More