Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands

icann whois

template c100.00 08 17 21.still001
video

How the Spanish cybercriminal underground operates | Salted Hash Ep 30

Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks.

gdpr

GDPR is a missed opportunity for real privacy protection

Doubling down on individual control makes GDPR an expensive nuisance for enterprises while failing to protect consumers against likely data harms.

template c100.00 00 52 07.still001
video

Learn what the 'zero trust' security model really means | Salted Hash Ep 29

Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.

protected key within a secured network

4 most in-demand cybersecurity skills

As cyber attacks continue to increase in number and escalate in complexity, companies are looking to hire hard-to-find cybersecurity experts to help secure their needs. Here’s a look at the four most in-demand cybersecurity skills for...

GDPR, legal, European Union

Now that it’s here, what can we learn from the bumpy journey to GDPR compliance?

Think you’re done with hearing about GDPR? Not so fast. Data privacy legislation isn’t going anywhere and there’s a lot we can learn from the ups and downs of the EU experience.

insurance policy

Cyber insurance: Is it worth the investment?

While cyber liability insurance policies are complex and proving claims can be daunting, CIOs in the midmarket space agree access to resources make the investment worthwhile.

1 the state of it security 2018 intro

The state of IT security, 2018

Who's in charge of IT security? To whom do they report? How big is their budget? We've got answers.

template c100.00 02 54 15.still001
video

TSB phishing attacks | Salted Hash Ep 33

TSB customers in the U.K. were already frustrated by the bank's technical problems, but now the situation has gotten worse as criminals take advantage of the chaos. Host Steve Ragan looks at recent TSB phishing attacks and the kit...

GDPR, legal, European Union

CRM and GDPR: 8 points you may have missed

Today is the first day of the rest of your life … or at least of the endless process of GDPR compliance. Your customer relationship management (CRM) and marketing automation systems are ground zero for GDPR issues, but that’s not all....

CSO slideshow - Insider Security Breaches - Flag of China, binary code

China and the West are converging on consumer data protection policy

As the EU’s General Data Protection Regulation comes into force on May 25, China is also wrestling with the complex consumer protection issues that bedevil all digital economies.

template c100.00 01 18 00.still001
video

How deception technologies use camouflage to attract attackers | Salted Hash Ep 26

Host Steve Ragan reports from the show floor at RSA 2018, where talks with Chris Roberts, chief security architect at Acalvio Technologies, about the benefits and misconceptions of deception technologies.

tech talk opening.00 14 30 21.still001
video

Tech Talk: Prepping for GDPR

CSO's Michael Nadeau and Steve Ragan join Computerworld's Ken Mingis and IDG Communications' Mark Lewis to look at what the new EU privacy rules mean. They offer insights on how companies can prepare – and what happens if they don't.

cwan 011 blockchain
video

What is blockchain technology?

Cryptocurrency such as Bitcoin has garnered most of the media coverage and hype to date, but keep your eye on blockchain – this new technology is poised to change IT in much the same way open-source software did a quarter century ago....

template c100.00 06 00 09.still001
video

What an Apple phishing attack looks like | Salted Hash Ep 32

How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.

data protection lock chain

Consumer data protection is an advantage, not just a responsibility

A deeper dive into the tectonic shift from business models that sell data towards those that market data protection. The backdrop: GDPR is around the corner even though 59 percent of US employees haven’t even heard of the GDPR.

hurricane irma 2

The hurricane preparedness guide for businesses

The period between June and November is one of the riskiest times for business. Why? Because it’s hurricane season.

template c100.00 09 18 18.still001
video

Get a hands-on, inside look at the dark web | Salted Hash Ep 25

Reporting from RSA 2018, host Steve Ragan helps dispel the hype and confusion surrounding the dark web, as he talks with Alon Arvatz, co-founder at IntSights.

template c100.00 02 22 03.still001
video

Can AI help bridge the IT security skills gap? | Salted Hash Ep 27

Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to...

Load More