Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands

European Union [EU] flag and binary code

machine learning ai artificial intelligence

Risky AI business: Navigating regulatory and legal dangers to come

Artificial intelligence poses a wide range of hidden and unknown dangers for enterprises deploying the technology. Here’s how to guard against the legal and compliance risks of AI.

radar storm

How to leverage weather to build a disaster recovery plan

Meteorologists can help businesses understand the seasonal weather threats they may face – both the extreme potential and frequency with which certain things could occur.

European Union [EU] flag-lock on top of a map of Europe

Becoming GDPR compliant quickly, effectively and risk-free

The hype around the GDPR compliance has recently reached the fever pitch recently. Thus, it seems essential to share the tips that help company become GDPR compliant without risks and on time.

marketing certifications hp

13 emerging IT certifications for today’s hottest skills

From the cloud, to cybersecurity, to data analytics — these new and emerging IT certifications are growing in popularity and demand, according to a report from Global Knowledge.

vulnerable balance egg risk breach security

How to be compliant with data breach notification laws

As a CIO, the bucks stops with you for matters pertaining to data breaches and compliance towards subsequent notifications.

10 global policy

Policy challenges of artificial intelligence

Developments in artificial intelligence are a driver of new products and services that will improve the richness, variety and comfort of our lives, speed up productivity growth, and make consequential decisions fairer and more...

salted hash thumbnail final
video

Managing open-source mobile security and privacy for activists worldwide | Salted Hash Ep 18

Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the...

11 regulations

Unnecessary and counterproductive regulations don’t make good competition policy

With increased criticism of tech companies’ size and power, it is important to note that unnecessary regulations would be counterproductive, causing more harm than good.

SHEp17
video

Spectre and Meltdown | Salted Hash Ep 17

What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.

nordvpn

Get 3 Years of NordVPN Service for Just $2.75 Per Month

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.75 per month for 3 years, if you sign up right now.

Global economic technology prospects: China and the United States of America

Navigating the Chinese cloud

Chinese startups leverage the cloud to navigate legal and intellectual property (IP) risks internationally – you should do the same.

sequence 01.00 29 58 30.still001
video

Ready for the EU's GDPR compliance deadline? Many companies aren't | Salted Hash Ep 16

CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline.

program dirty 2018.01.25 11.10.07.00 00 15 31.still002
video

Tech Talk: IT trends for 2018 – passwords on the way out, blockchain evolves

Our tech panel envisions the end of passwords, looks at how blockchain is evolving, details why 'serverless' computing is a boon to devs and wonders why Apple's HomePod seems late to the game.

program dirty 2018.01.25 11.10.07.00 01 18 51.still001
video

Tech Talk: The beginning of the end of the password in 2018

Hackers can crack them, and users are careless with them. Passwords have long been problematic, but they are getting renewed attention after a series of major breaches. Our panelists look at the coming technology to help with password...

program dirty 2018.01.23 12.03.01.00 00 36 44.still001
video

Mingis on Tech: 2018 – the year blockchain breaks out

Blockchain continues to evolve and grow, as more companies test it out. It's now seen as the heart of a new global shipping platform that could save companies billions of dollars and as the underpinning for a P2P cloud storage...

amazon shredder

Get 29% Off This 6-Sheet Micro-Cut Paper and Credit Card Shredder

This powerful micro-cut shredder turns a letter-sized sheet into 2,235 pieces of confetti, up to 6 sheets at a time. It can also destroy credit cards, rendering them useless.

sequence 01.00 37 12 47.still001
video

The people you call when you've had a breach | Salted Hash Ep 15

Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018.

rules procedures guidelines process structure

The critical role of processes in your disaster recovery strategy

Putting in the advance groundwork during quieter times not only leads to cooler heads during more turbulent times, but will also make a tremendous difference to your customers, employees and future business performance.

Load More