Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands


Blackhat_2017
video

Stop blaming users for security misses

Does the message to users about security need to change? Or does IT need to rebuild infrastructure so users can worry less about security? Wendy Nather, principal security strategist at Duo Security, talks with CSO senior writer...

0 shadow it intro

Headache for the CIO: Shadow IT is soaring as LoBs seek greater autonomy

Due to the explosive cloud and other third-platform technology adoption, lines of businesses are relying far less on enterprise IT to fund their technology purchases.

pixabay cybersecurity stock

Harvard PhD Andy Yen provides tips to governments on cybersecurity protections

Harvard PhD provides thoughts on innovative Cybersecurity hacks and protections.

business planning

How to create an effective business continuity plan

A business continuity plan outlines procedures and instructions an organization must follow in the face of disaster, whether fire, flood or cyberattack. Here's how to create one that gives your business the best chance of surviving...

Mingis_on_Tech
video

Mingis on Tech: How linguistics can help catch cyberattackers

When it comes to tracking down the bad actors behind malware and ransomware, cybersecurity firms are turning to linguists.

csan 001 top 15 security breaches
video

The 15 worst data security breaches of the 21st century

Some of the largest companies in the U.S. have been targets of hackers, including Yahoo, JP Morgan Chase and TJX. Watch as we detail the top 15 breaches and their overall impact on customers or employees.

Executive looking through telescope on boat leading businessmen

GDPR: Why it is time for the CIOs to be counted?

Where most companies are with GDPR compliance, why it matters to CIOs, and what can be done to take this business risk off the table.

stock security

Cyber starts with skilled workers

Cyber attacks will continue to become more complex, frequent and destructive. Yet, when discussing cybersecurity, we consistently avoid focusing on the elephant in the room. We do not have enough cybersecurity professionals to help...

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

the word

Blockchain: what is it good for, in real-world IT?

Blockchain elicit's big ideas – but how can IT utilize it to make day-to-day life easier?

cybersecurityshutterstock 380217166

What CIOs need to know about authentication

Email is so critical to business communications today that many assume it's a safe and trustworthy medium, but recent cyberattacks prove it's not. What CIOs need to know about authentication and DMARC, a key tool to address this...

audit searching

10 ways you’re failing at IT audits

IT audits can feel like a grim nuisance, but great value awaits those who heed these common mistakes that inevitably lead to an IT audit disaster.

SSL padlock icon security

It's time to upgrade to TLS 1.3 already, says CDN engineer

Businesses dragging their heels over rolling out TLS 1.2 on their website might have an excuse to delay a little longer: Version 1.3 of the TLS (Transport Layer Security) encryption protocol will be finalized later this year, and...

puzzle tower / growth / achievement / risk / balance

Insights from the Gartner Security & Risk Summit

The Gartner Security & Risk Summit took place the week of June 12-15. Here are the key insights relevant to CIOs and other IT leaders.

engie drone close up

EU wants to ease commercial drone use with future flight rules

The European Commission wants to make it easier for lightweight drones to fly autonomously in European airspace -- with logistics, inspection services and agricultural businesses set to benefit. Last Friday, the Commission...

customer loyalty ts

The privacy legacy of Edith Marcus

Edith Marcus passed away recently. You may never have heard of Edith; she was a private person in the best sense of the phrase. While Edith did make use of technology, she was keenly aware of the personal information she shared, who...

artificial intelligence / machine learning / network

Why AI is crucial to cyber security

Why AI is crucial to cyber security

escape tool

24% off Resqme Keychain Car Escape Tool 2-Pack - Deal Alert

Made in the USA and originally developed for first responders, this 2-in-1 safety and survival tool features a blade for cutting a seatbelt and a spring-loaded steel spike for breaking a side window. Keep in on your keychain, or clip...

Load More