Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands

4tb drive
03 crimeware

Unicorn GDPR IDC

10 GDPR myths debunked

Don’t be fooled. GDPR implementation is a complex undertaking and being unprepared could have significant and expensive repercussions.

Mingis_on_Tech
video

Mingis on Tech: Android vs iOS – Which is more secure?

Apple's iOS has long had the reputation of being more secure than Android, but that may not necessarily be the case. Here's how to evaluate each side's claims about mobile security.

0 shadow it intro

Don’t let the shadows scare you

Shadow IT does not have to be a threat to your organization anymore.

aukey dashcam

22% off Aukey Dash Cam, Full HD Wide Angle With Night Vision - Deal Alert

This cam features an emergency recording mode, activated by sharp turns or sudden stops, which automatically captures unexpected driving incidents.

16 hackers

Hackers are aggressively targeting law firms' data

Even law firms are no longer safe from hackers. Here's why.

global business technology

Fresh insights on the information age and cybersecurity

Here are key findings, fresh insights and a review of different types of businesses in the tech world, and cybersecurity feedback from a recent TIA gathering of tech leaders and cybersecurity professionals.

cloud security

Cloud security: Trends and strategy

Cloud services have the power to optimize your business’s efficiency, but executives are wary of the technology’s security risks. NTT America’s Jeffrey Bannister examines the current state of cloud security, and explores the steps a...

Blackhat_2017
video

Chasing down leakers fast with ThinAir's asset tracking

Tony Gauda, CEO of ThinAir, talks with CSO senior writer Steve Ragan about how the ThinAir system tracks which users within an organization have seen each piece of data, spotting anomalous information and quickly finding the source of...

Blackhat_2017
video

Do developers care about security?

They certainly do, according to Sarah Gibson, application security consultant at Veracode, who talks with CSO senior writer Fahmida Rashid about the issues around application security, and how having a collaborative security team is...

Blackhat_2017
video

Safeguarding power grids and other critical infrastructure from data leaks

CSO senior writer Steve Ragan talks with cybersecurity experts Krypt3ia and Kodor about how the pair seek out passwords, schematics and other sensitive documents on SCADA control system architectures that shouldn't be available...

Blackhat_2017
video

Bringing behavioral game theory to security defenses

Kelly Shortridge and CSO senior writer Fahmida Y Rashid talk about using behavioral game theory to take advantage of hackers’ mistakes and manipulate the data they think they're receiving. People generally make decisions by either...

Faraday_Blackhat2017
video

Simple tips to keep your devices secure when you travel

CSO security reporters Fahmida Rashid and Steve Ragan share some easy ways to keep your data and devices secure while traveling, even at the Black Hat conference, where active scanning is the norm. (And check out the built-in Faraday...

Blackhat_2017
video

How DevOps and cloud will speed up security

Zane Lackey, CSO and co-founder of Signal Sciences, talks with CSO senior writer Fahmida Rashid about how DevOps and cloud can help organizations embed security into their technology structures, enabling business to move faster.

Blackhat_2017
video

Stop blaming users for security misses

Does the message to users about security need to change? Or does IT need to rebuild infrastructure so users can worry less about security? Wendy Nather, principal security strategist at Duo Security, talks with CSO senior writer...

0 shadow it intro

Headache for the CIO: Shadow IT is soaring as LoBs seek greater autonomy

Due to the explosive cloud and other third-platform technology adoption, lines of businesses are relying far less on enterprise IT to fund their technology purchases.

pixabay cybersecurity stock

Harvard PhD Andy Yen provides tips to governments on cybersecurity protections

Harvard PhD provides thoughts on innovative Cybersecurity hacks and protections.

business planning

How to create an effective business continuity plan

A business continuity plan outlines procedures and instructions an organization must follow in the face of disaster, whether fire, flood or cyberattack. Here's how to create one that gives your business the best chance of surviving...

Mingis_on_Tech
video

Mingis on Tech: How linguistics can help catch cyberattackers

When it comes to tracking down the bad actors behind malware and ransomware, cybersecurity firms are turning to linguists.

Load More