Security

Security | News, how-tos, features, reviews, and videos

screen shot 2018 09 21 at 10.43.22 am
stateofcybercrimethumb

Rendering of Cyber Security Center in Augusta Georgia, courtesy of Georgia Technology Authority.

Unique collaboration turned a governor’s vision of a cyber center into reality

Interviewing the State of George's CIO Calvin Rhodes, who helped lead a collaboration of government, academia, the military and the private sector to create a new cyber ecosystem.

thumbnail
video

How to use the Shodan search engine to secure an enterprise's internet presence

Shodan, a search engine for all ports within the internet, can help enterprises identify and lock down security vulnerabilities. Senior writer J.M. Porup and content producer Juliet Beauchamp talk through the security scenarios.

thumbnail
video

Talking DerbyCon, spy chip whispers and Google's data breach | Salted Hash Ep 47

Steve Ragan and J.M. Porup catch up post-DerbyCon conference to discuss psychological issues in the infosec community, supply chain security and whether it's time to make China the boogeyman again, as well as Google's recent data...

thumbnail
video

Regulating the IoT: A conversation with Bruce Schneier | Salted Hash Ep 49

Security expert and author Bruce Schneier talks with senior writer J.M. Porup about that widespread use of connected chips -- allowing hackers to access cars, refrigerators, toys and soon, even more home consumer items.

thumbnail2
video

How secure are electronic voting machines? | Salted Hash Ep 48

With the midterm elections looming, electronic voting machines are getting increased scrutiny. J.M. Porup, senior writer at CSO, sits in the hosts chair this episode, breaking down the security risk with content producer Juliet...

template c100.00 04 14 02.still001
video

Mingis on Tech: Data breaches in a world of 'surveillance capitalism'

Facebook and Google recently acknowledged data breaches affecting millions of users. This won't be the last time that happens. CSO's J.M. Porup and Computerworld's Ken Mingis examine what's really going.

security group team circuitry

Lack of C-suite collaboration hampering cybersecurity, report finds

As cyber-attacks grow in frequency, chief information security officers and C-suite executives must work more closely together.

The U.S. Capitol building in Washington

GSA’s entity validation request for proposal is flawed

The plan to create a government-run identifier raises intellectual property concerns and duplicates private sector efforts.

aerial view of pentagon government security dv1282020

Pentagon CIOs struggle with legacy tech, security. Sound familiar?

Defense Department tech chiefs working to modernize sprawling IT infrastructure encounter similar hurdles — if on a larger scale — as CIOs in other agencies and the private sector.

phishing hacker binary keyboard privacy security breach

What exactly is a privacy risk?

Without knowing what privacy risks are, businesses and consumers would be left in the dark under new privacy law proposals.

businessman stranded on an outcropping of rock in the ocean, surrounded by sharks

Top 10 GRC mistakes — and how to avoid them

A sound governance, risk and compliance (GRC) strategy is more valuable — and harder to hone — than you might think. Here’s how to avoid looming disaster.

3 legal law books

New privacy laws must permit valuable uses of public records

Let’s be careful not to shortchange the free flow of public data in the rush to pass new privacy.

board ceo executives table

CIOs engage in a cat-and-mouse struggle to secure company communications

Every company has a vested interest in protecting sensitive data. CIOs can reduce the risk of phishing attacks and other exploits by deploying cloud-based communication monitoring software that leverages both internal and external...

template c100.00 01 59 12.still001
video

VirusTotal Intelligence, a search engine for malware | Salted Hash Ep 45

In this episode, host Steve Ragan talks with Karl Hiramoto, technical solutions consultant for VirusTotal, maker of VirusTotal Intelligence, a searchable detection tool for malware.

1 network internet connected grid earth power satellite view

Can the internet crash? How the unthinkable could happen

If the dark day comes when the internet does experience a global crash, the thing that takes it down will be, almost by definition, the thing we didn't see coming.

11 sharing

Data sharing: a problematic idea in search of a problem to solve

Proposals to require companies to share their data are riddled with flaws and solve no pressing marketplace defects.

USA / United States of America / American flag

It’s time for a uniform national privacy law

In light of new laws from Europe and California privacy needs to be on the Congressional agenda.

template c100.00 06 50 01.still001
video

Detecting bot attacks | Salted Hash Ep 44

In this episode, host Steve Ragan talks with Engin Akyol, CTO at Distil Networks at the Black Hat 2018 conference, about bot account takeovers and how they can be detected.

Load More