Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Gmail Google Mail
cyber security

SSL padlock icon

Google turns on HTTPS for all blogspot blogs

All blogs hosted on Google's blogspot.com domain can now be accessed over an encrypted HTTPS connection.

free

Interop: 12 killer (and free) tools for network engineers

Visibility is key to troubleshooting network woes, but getting such access can be expensive. To help out, a veteran networking pro shared with attendees of the big Interop conference in Las Vegas his list of a dozen mostly free...

privacy policy

Privacy policy or privacy notice: what's the difference?

Is there a difference between a privacy policy and a privacy notice? Some of the confusion comes from a company’s description of their privacy practices on their website being called a privacy policy. Some people ask, “Isn’t the...

imagetragick logo

Critical flaws in ImageMagick library expose websites to hacking

A tool used by millions of websites to process images has several critical vulnerabilities that could allow attackers to compromise Web servers.

insurance

What is cyber insurance and why you need it

Cyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.

dark corners of network

Ads mislead over broadband Internet access pricing, regulator warns

Pricing in ads for broadband Internet access is too often misleading and needs tighter regulation.

conceptual illustration of flying drones with large eye

4 IT companies allowed to use commercial drones

The Federal Aviation Administration has granted approval for more than 5,000 so-called Section 333 exemptions to operate commercial drones over the past year, and among those getting the go ahead are familiar names in the enterprise...

enterprise IT drones

Commercial drones gaining altitude with top IT vendors

Enterprise IT vendors didn't have much to say about commercial drones just 18 months ago, but now Cisco, AT&T, Verizon and others are making their moves.

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world.

Panama papers

Panama Papers leak explained: What you need to know about the Mossack Fonseca hack

Offshore tax shelters may pay, but scrimping on security doesn't.

secure locks

CII’s Best Practices badge program is making open source projects more secure

Curl, GitLab, the Linux kernel, OpenBlox, OpenSSL, Node.js and Zephyr have received badges.

planning

How to perform a risk assessment

A risk assessment gives you the information protection equivalent of the opposing team’s playbook, telling where and how attackers are most likely to strike and what the damage will be.

Digital Key, security, encryption

Quantum computers pose a huge threat to security, and the NIST wants your help

It's no secret that quantum computers could render many of today's encryption methods useless, and now the National Institute of Standards and Technology wants the public to help it head off that threat.

terrorist tools

Trend Micro: 6 most popular homebrewed terrorist tools

Terrorists are developing and distributing encryption tools that protect privacy of their communications, and other apps that include a news-feed compiler and DDoS attack software, according to a Trend Micro report.

Tech Titans Talk: The IDG Enterprise Interview Series

In the IDG Enterprise Interview Series, you'll hear from technology CIOs and CEOs on today's burgeoning trends, ongoing headaches and upcoming product plans. Check out this informative series from IDG Enterprise Chief Content Officer...

office printer

Think that printer in the corner isn’t a threat? Think again

Interestingly enough, because a printer is so innocuous and seemingly harmless, that’s the exact reason it poses a threat, according to the security analysts who talked to CSO about this issue.

lock

Why you need DRM for your documents

From protecting merger discussions to everyday document management, enterprise DRM is a mature, mainstream enterprise technology. So why aren’t more companies using it?

terms and conditions

Appellate court ruling will make a lot more work for Web designers

The decision from a case involving a company’s method of presenting its terms and conditions is otherwise fairly meaningless.

Load More