Security

Security | News, how-tos, features, reviews, and videos

USA / United States of America / American flags

tf19 054 thumb
video

All about U.S. tech antitrust investigations | TECH(feed)

Four large tech companies -- Apple, Amazon, Google and Facebook are under investigation in the U.S. for allegedly anticompetitive behavior. These antitrust investigations on both the federal and state levels are aimed at uncovering...

itil tips for implementation lightbulb innovation process strategy iot by ipopba getty

Raytheon’s cloud-based test bed takes risk out of innovation

Implementing new technology in the defense industry comes with a lot of considerations. Here’s how Raytheon development a virtual environment for experimentation without risk.

shadow flashlight shadowy investigation

Shining light on dark data, shadow IT and shadow IoT

What's lurking in the shadows of YOUR organization? What you don't know can hurt you. Insider Pro columnist Mike Elgan looks at how your business is at risk and offers six steps to minimize it.

5G mobile wireless network technology

5G is critical to the competitiveness and future success of America’s small businesses

5G represents an exciting range of new possibilities, but it's also important not to let the hype overwhelm the need for security, privacy and safety.

yx7mvik

Lemonade is changing the way we insure our homes

Your home can be broken into or destroyed by a natural disaster when you least expect it. When that happens, how will you get back on your feet? Ideally, you would’ve been paying homeowner’s or renter’s insurance to cover your...

cssg 024 thumb
video

How to set up Microsoft Teams for security and compliance

These are the security and compliance decisions you need to make when deploying Microsoft Teams.

Asset-recovery team pulls dollar sign back from over the edge of a cliff; hacker/keyboard background

Almost all cyberattacks in 2018 were preventable

New research shows cyber-security incidents that exposed 5 billion records cost an estimated $45 billion last year.

tt19 038 thumb
video

How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk)

The California Consumer Privacy Act (CCPA) is, in some ways, similar to Europe's GDPR. This rule, which goes into effect in 2020, gives individual users more ownership over their own data. Users can even refuse to allow companies to...

tf19 052 thumb
video

FTC fines YouTube, but do fines really encourage change? | TECH(feed)

The FTC hit yet another tech company with a seemingly massive fine for mishandling user data. This time, YouTube, owned by Google, is forced to pay $170 million for collecting data about children under 13 without parental consent. The...

cssg 023 thumb
video

How to disable basic or legacy authentication to set up MFA in Office 365

Microsoft recommends setting up multi-factor authentication in Windows 10 for better security, but you have to disable basic or legacy authentication first.

csan19 002 thumb
video

What is phishing? Learn how this attack works

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this increasingly sophisticated form of cyberattack.

tf19 049 thumb2
video

Texas ransomware attacks: to pay or not to pay? | TECH(feed)

Nearly two dozen cities in Texas have been hit by a ransomware attack executed by a single threat actor. These attacks beg the question: Is it ever worth it to pay a cyber attacker’s ransom? In this episode of TECH(feed), Juliet...

binary code spanning a world map

Lack of cybersecurity is the biggest economic threat to the world over the next decade, CEOs say

As digital transformation continues apace, CEOs see cybersecurity as the number one threat to the global economy in the next decade.

cssg 022 thumb
video

How to avoid using RDP in Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it. Here’s how.

cssg 021 thumb
video

How to set up Edge Chromium security options

Edge Chromium can provide more protection for organizations that use older versions of Windows.

tt19 033 thumb
video

Black Hat 2019 and DEF CON 27: What to expect at hacker summer camp | TECH(talk)

Every year, thousands of hackers arrive in Las Vegas for three large security conferences -- DEF CON, Black Hat and Bsides Las Vegas -- taking place from Monday through Sunday next week. CSO Online's J.M. Porup chats with Juliet about...

tf19 046 thumb update2
video

The latest large-scale data breach: Capital One | TECH(feed)

Just a few days after Equifax settled with the FTC over its 2017 data breach, Capital One announced it was the target of a March attack. Identifying information and bank account numbers are among some of the data breached in the...

cssg 020 thumbpng
video

How an attacker can target phishing attacks

There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you...

Load More