Security

Security | News, how-tos, features, reviews, and videos


security group team circuitry

Lack of C-suite collaboration hampering cybersecurity, report finds

As cyber-attacks grow in frequency, chief information security officers and C-suite executives must work more closely together.

The U.S. Capitol building in Washington

GSA’s entity validation request for proposal is flawed

The plan to create a government-run identifier raises intellectual property concerns and duplicates private sector efforts.

screen shot 2018 09 21 at 10.43.22 am

Apple's dropping Back To My Mac Remote Access. Here's an Alternative, Currently Discounted.

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year.

aerial view of pentagon government security dv1282020

Pentagon CIOs struggle with legacy tech, security. Sound familiar?

Defense Department tech chiefs working to modernize sprawling IT infrastructure encounter similar hurdles — if on a larger scale — as CIOs in other agencies and the private sector.

phishing hacker binary keyboard privacy security breach

What exactly is a privacy risk?

Without knowing what privacy risks are, businesses and consumers would be left in the dark under new privacy law proposals.

businessman stranded on an outcropping of rock in the ocean, surrounded by sharks

Top 10 GRC mistakes — and how to avoid them

A sound governance, risk and compliance (GRC) strategy is more valuable — and harder to hone — than you might think. Here’s how to avoid looming disaster.

3 legal law books

New privacy laws must permit valuable uses of public records

Let’s be careful not to shortchange the free flow of public data in the rush to pass new privacy.

board ceo executives table

CIOs engage in a cat-and-mouse struggle to secure company communications

Every company has a vested interest in protecting sensitive data. CIOs can reduce the risk of phishing attacks and other exploits by deploying cloud-based communication monitoring software that leverages both internal and external...

template c100.00 01 59 12.still001
video

VirusTotal Intelligence, a search engine for malware | Salted Hash Ep 45

In this episode, host Steve Ragan talks with Karl Hiramoto, technical solutions consultant for VirusTotal, maker of VirusTotal Intelligence, a searchable detection tool for malware.

1 network internet connected grid earth power satellite view

Can the internet crash? How the unthinkable could happen

If the dark day comes when the internet does experience a global crash, the thing that takes it down will be, almost by definition, the thing we didn't see coming.

11 sharing

Data sharing: a problematic idea in search of a problem to solve

Proposals to require companies to share their data are riddled with flaws and solve no pressing marketplace defects.

USA / United States of America / American flag

It’s time for a uniform national privacy law

In light of new laws from Europe and California privacy needs to be on the Congressional agenda.

template c100.00 06 50 01.still001
video

Detecting bot attacks | Salted Hash Ep 44

In this episode, host Steve Ragan talks with Engin Akyol, CTO at Distil Networks at the Black Hat 2018 conference, about bot account takeovers and how they can be detected.

8 authentication basics password identity protected security

Sheltered Harbor ensures cyber resilience for financial services firms

After the infamous Sony Pictures hack in 2014, the financial services industry came together to develop Sheltered Harbor to ensure customer financial data would remain secure and accessible in the event of a cyberattack.

data analytics - statistical analysis - charts, graphs, strategy planning

Sprint calls on open source analytics to prevent cyberfraud

Sprint’s open source Elastic Stack analytics implementation helped the mobile device and network provider reduce mobile phone fraud by 90 percent.

hacker

Online manipulation is the latest data protection debate

The furor over “dark patterns” reveals the limits of consumer control as the primary tool of data protection.

template c100.00 00 44 13.still001
video

Blue Team Village, DEF CON 2018 | Salted Hash Ep 43

Host Steve Ragan talks to Munin, a staffer at the DEF CON Blue Team Village about what's happening and what you can expect.

template c100.00 03 57 09.still001
video

An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41

In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.

Load More