Security

Security | News, how-tos, features, reviews, and videos

dark secrets of enterprise architecture men meetng in dark tunnel

cssg 016 thumb
video

How to set up a Microsoft Azure backup process

Setting up a backup process in Azure is one way to quickly recover from a ransomware attack.

man shouting aggressive communication expressive

UK ‘Online Harms White Paper’ is ambitious and takes prescriptive approach

In order for the approach to not negatively affect innovation, however, there needs to be more prioritization.

thumb
video

Card skimming moves online | TECH(talk)

CSO staff writer Lucian Constantin offers advice on how online retailers can prevent online payment fraud.

qpahy9p 2

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features.

Facebook

Facebook embraces content moderation regulation…or does it?

The company’s stance suggests a sensible alternative to government censorship.

golden egg nest retirement numbers savings precious business value growth

12 ways IT can create business value in 2019

From optimizing operations to adopting new platforms aimed at innovation, IT leaders driving businesses forward with each tough choice they make.

6 indirect expenses cost money fine penalty pepi stojanovski unsplash

Cybercrime is increasing and more costly for organizations

CIOs need to focus on people-based attacks and use intelligent tools to limit data loss and business shutdowns.

nycrr cybersecurity gavel regulation compliance law nyc statue of liberty

The United States needs a federal privacy law

As different US states and countries around the world enact privacy laws, it’s time for the federal government to as well.

cssg 015 enable auditing
video

How to audit Windows Task Scheduler to detect attacks

Learn how to prevent attackers from using Task Scheduler to hide and set up tasks to access Windows systems.

thumb
video

Huawei’s possible lawsuit, ransomware readiness, old malware resurfaces | TECH(feed)

The ongoing battle between the U.S. and Huawei could soon go to court as Huawei reportedly prepares to sue the U.S. government. Plus, 2019 will see ride sharing companies going public… but which will be first? And as a decade-old...

audit binary compliance magnifying glass investigate

What is an IT auditor? A vital role for risk assessment

An IT auditor is responsible for analyzing and assessing an organization’s technological infrastructure to find problems with efficiency, risk management and compliance.

Map of Europe with the flag of the European Union and a combination lock / GDPR / security / privacy

The drum beat continues for regulating the content moderation practices of digital platforms

New transatlantic initiatives focus on an increased government role.

headache man

The 11 biggest issues IT faces today

From securing IoT to retraining IT talent to finding new revenue streams, CIOs have more than their share of concerns keeping them up at night.

debate speech balloons thought bubble hands holding bubbles argue disagree

It’s time to think seriously about regulating platform content moderation practices

A sensible regulatory regime can discourage harmful content and still protect free speech.

mac3

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike.

audit binary compliance magnifying glass investigate

How data governance can support data privacy compliance

Organizations that already have a data governance capability in place have a solid head start and can leverage it to facilitate many aspects of data privacy compliance.

2 man with binoculars data breach research spy

We can’t hide from digital sleuths anymore

But privacy law can protect us from harm.

sample of all graphics.00 14 06 21.still001

The race to lock down industrial control systems | Salted Hash Ep 44

Guest host Juliet Beauchamp and CSO senior writer J.M. Porup talk about the challenges around securing the systems and networks used to control industrial plants and infrastructures.

Load More