Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

windows bugs crashes
magician hat trick illusion

hacker

Diversified supply chain helps 'Vendetta Brothers' succeed in criminal business

Even smaller criminal groups are using smarter business tactics to help insulate themselves from prosecution and to diversify their product supply.

video

Why employees are still a security risk

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Michael Bruemmer, vice president at Experian Data Breach Resolution, about a recent survey that said companies are unprepared to stop...

01 intro myth

Security myths that can make you laugh… or cry

To help organizations cut through the noise to focus on improving security structures, security experts identify industry myths and provide suggestions to avoid falling for them. 

FBI Comey

FBI reports more attempts to hack voter registration system

The U.S. Federal Bureau of Investigation has found more attempts to hack the voter registration systems of states, ahead of national elections.

Yahoo Corporate

The Yahoo hackers weren't state-sponsored, a security firm says

Common criminals, not state-sponsored hackers, carried out the massive 2014 data breach that exposed information about millions of Yahoo user accounts, a security firm said Wednesday.

dangerous cyber celebrities 2016 intro

Most dangerous cyber celebrities of 2016

Intel ranks celebrities by dangerousness if you search for them online.

strata apache spot hadoop

Meet Apache Spot, a new open source project for cybersecurity

Hard on the heels of the discovery of the largest known data breach in history, Cloudera and Intel on Wednesday announced that they've donated a new open source project to the Apache Software Foundation with a focus on using big data...

fiber internet ethernet cord networking

73% of companies using vulnerable end-of-life networking devices

Seventy-three percent of companies are using vulnerable, end-of-life networking equipment, up from 60 percent last year, according to a review of more than 212,000 Cisco networking devices at 350 organizations across North America

marten mickos
Q&A

HackerOne CEO: 'We’re building the world’s biggest security talent agency'

Marten Mickos is crowdsourcing security with a growing army of ethical hackers who can help your company if you’re ready to adopt a new security mindset.

Mastercard

Mastercard launches dev platform for building payment, security apps

Mastercard launched an ambitious open Mastercard Developers platform to help third-party developers create commerce-related apps and services.

Glowing band-aids on red background

Analysts laud and lance new Microsoft browser armor

Analysts today gave mixed reviews to Microsoft's new security model for its Edge browser.

yahoo mail

Six senators demand more details about the Yahoo data breach

Six U.S. senators called Yahoo's belated discovery of a massive data breach "unacceptable," and they're demanding that the company provide more details.

gottfried leibbrandt ceo swift sibos 2016

Swift CEO reveals three more failed attacks on banking network

Banks stopped three new attempts to abuse the Swift financial transfer network this summer, its CEO Gottfried Leibbrandt said Monday, as he announced Swift's plan to impose tighter security controls on its customers.

ddos krebs

Security blogger Krebs says IoT DDoS attack was payback for a blog

Security blogger Brian Krebs says a massive DDoS attack that took down his Web site last week was likely the consequences for his outing of two Israelis who ran a DDoS-for-hire business.

Facebook gambles $16 billion on WhatsApp

Halt WhatsApp data transfers, German privacy watchdog tells Facebook

Facebook must stop collecting information about WhatsApp users in Germany, a local privacy watchdog has ordered.

password security

Your users have porous passwords? Blame yourself, IT.

Your efforts at raising security awareness could be making users feel that it’s pointless to try to protect themselves.

red apple

How to mitigate hackers who farm their victims

Feeling raked over? You’re not alone; someone is probably probing your low hanging fruit right now. CSO covers how hackers farm the enterprise and how companies can mitigate the risks.

00 intro

10 ways to secure a mobile workforce

As much as you might want to implement all the latest best practices and lock down your company like Fort Knox, you need to align your policies to your company culture.

Load More