binary code, magnifying lens, skull and crossbones

thumb 1
video

Coming soon: A drone delivery service? | TECH(feed)

There’s been buzz for years about the potential drones have to change the way we get packages delivered. In a huge step towards making this a reality, the Federal Aviation Administration in the United States gave approval to a drone...

android anti virus security

Best Android antivirus? The top 13 tools

There are plenty of antivirus tools for Android. Here's how the top 13 measure up in protection, usability and features.

identity concept 164551610

Using citizen IDs for commercial services will take an identity ecosystem

Citizen identity systems like the UK’s Verify initiative are costly. It only makes sense to offset that cost by allowing commercial entities to utilize citizen IDs. Here's what it will take.

06 permission

Check your access control permissions before hackers do

Every organization has devices, networks or cloud services with improperly configured permissions that expose sensitive data or could allow hackers to gain privileged access. Check them now.

skull and crossbones in binary code

GandCrab attackers exploit recently patched Confluence vulnerability

If your company uses Confluence, make sure you have the latest available patches for this vulnerability.

bmsm tile elitedesk1554301468036

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code.

patch on top of Windows logo

How to prep legacy Windows systems for the switch to SHA-2

Install these patches on Windows 7 and other legacy platforms now so you can continue to receive security updates.

7 solar flare emergency doomsday

Why your business continuity and disaster recovery plans should account for EMP attacks and GMD events

A new executive order from the White House directs critical infrastructure to prepare for electromagnetic pulse (EMP) attacks, but geomagnetic disturbance (GMD) events caused by solar flares are a greater threat to the enterprise.

thumb
video

2019 unicorn IPOs, plus, more tech start-ups poised to go public | TECH(feed)

Lyft was the first unicorn company to go public in 2019, and now Pinterest and Zoom have followed suit. In today’s episode of TECH(feed), Juliet cuts through some of the tech IPO noise and explains what a unicorn is, what these high...

title slide san francisco san antonio israel

Top 10 global cybersecurity hubs for 2019

Many cities and regions are vying for the title of Cybersecurity Capital. Here are 10 of the leading and emerging contenders.

compliance compliant regulation rules stamp gdpr

What is "reasonable security"? And how to meet the requirement

Privacy regulations such as the GDPR and CCPA require companies to provide "reasonable security" to protect customers' personal information. Here's how you might best achieve that standard.

financ credit pos

What is the EU's revised Payment Services Directive (PSD2) and its impact?

The upcoming PSD2 requirements, which include multifactor authentication for online European payment card transactions, will have a ripple effect on the payments processing industry in the U.S. and elsewhere.

Microsoft Office logo within an environment of abstract binary code with shield and lock.

Microsoft Office now the most targeted platform, as browser security improves

The number of attacks carried out using the popular suite has increased in the past two years, Kaspersky Lab researchers say.

nwht 021 thumb
video

How to use the chmod command: 2-Minute Linux Tips

Learn how to use the chmod command – the command for changing permissions on files. The only tricky part is understanding that there are two ways to represent file permissions.

artificial intelligence / machine learning / robot reading stack of books

Navigating the AI hype in security: 3 dos and 2 don'ts

“Very few things that advertise AI have the goods under the hood. I think what people are touting as innovative AI is still very basic, and we can go a lot further.” — Rick Grinnell, founder and managing partner, Glasswing Ventures

thumb
video

Card skimming moves online | TECH(talk)

CSO staff writer Lucian Constantin offers advice on how online retailers can prevent online payment fraud.

sacramento california state house

Proposed changes to California Consumer Privacy Act of 2018 could rewrite privacy law

A recently proposed repeal of 2018's CCPA called the PAA would shift California even closer to the requirements of the GDPR.

Networking cables viewed through a magnifying lens reveal a data breach.

Assume breach is for losers: These steps will stop data breaches

Yes, you do need to be prepared should your organization be breached, but countering social engineering, patching, multi-factor authentication and a solid backup plan will keep them from happening.

Load More