Security

Security | News, how-tos, features, reviews, and videos

automationlg

Globe with orbiting speech bubbles containing world flags, sitting on the edge of a laptop.

5 ways a global presence can benefit your tech company

Now is the best time to go global with your tech company. The advantages come in form of multifaceted choices at every level for your business. Moreover, given the unpredictability of the U.S. immigration laws, a global tech presence...

capital investment venture capitalist gauge gears

7 key IT investments for 2019 (and 3 going cold)

Technology investments are both soaring and falling as digital transformation grips enterprises of all types and sizes. Here's a look at 2019's likely tech hot and cold spots.

resolution primary

15 IT resolutions for 2019

Tech teams need to lose the grunt work, go on a dev diet, and exercise more strategic thinking.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

AI's dark secret? A desire for data without bounds

The AI revolution is hungry for personal data. The U.S. needs to pursue federal privacy legislation before machine intelligence and surveillance intersect.

lightning clouds storm thunder

Rethinking disaster recovery for the cloud

DR practices that were designed for in-house computing are out of sync with the cloud world. If you haven't already revised your DR plan for cloud computing, now's the time.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

By 2020, 60 percent of digital businesses will suffer major service interruptions

The sheer number of cyberattacks resulting from an inability to manage risks — and the burgeoning talent shortage to deal with it — will force CIOs to rethink their defense strategy.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

3 ways Mastercard uses AI to fight fraud

Mastercard leans on cutting-edge AI tools to combat cybersecurity threats at a time when the world is moving toward digital payments facilitated by contextual commerce.

screen shot 2018 09 21 at 10.43.22 am

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year.

stateofcybercrimethumb

Escaping the line of fire: 2018 U.S. State of Cybercrime

One in four of organizations report greater monetary losses.

Rendering of Cyber Security Center in Augusta Georgia, courtesy of Georgia Technology Authority.

Unique collaboration turned a governor’s vision of a cyber center into reality

Interviewing the State of George's CIO Calvin Rhodes, who helped lead a collaboration of government, academia, the military and the private sector to create a new cyber ecosystem.

thumbnail
video

How to use the Shodan search engine to secure an enterprise's internet presence

Shodan, a search engine for all ports within the internet, can help enterprises identify and lock down security vulnerabilities. Senior writer J.M. Porup and content producer Juliet Beauchamp talk through the security scenarios.

thumbnail
video

Talking DerbyCon, spy chip whispers and Google's data breach | Salted Hash Ep 47

Steve Ragan and J.M. Porup catch up post-DerbyCon conference to discuss psychological issues in the infosec community, supply chain security and whether it's time to make China the boogeyman again, as well as Google's recent data...

thumbnail
video

Regulating the IoT: A conversation with Bruce Schneier | Salted Hash Ep 49

Security expert and author Bruce Schneier talks with senior writer J.M. Porup about that widespread use of connected chips -- allowing hackers to access cars, refrigerators, toys and soon, even more home consumer items.

thumbnail2
video

How secure are electronic voting machines? | Salted Hash Ep 48

With the midterm elections looming, electronic voting machines are getting increased scrutiny. J.M. Porup, senior writer at CSO, sits in the hosts chair this episode, breaking down the security risk with content producer Juliet...

template c100.00 04 14 02.still001
video

Mingis on Tech: Data breaches in a world of 'surveillance capitalism'

Facebook and Google recently acknowledged data breaches affecting millions of users. This won't be the last time that happens. CSO's J.M. Porup and Computerworld's Ken Mingis examine what's really going.

security group team circuitry

Lack of C-suite collaboration hampering cybersecurity, report finds

As cyber-attacks grow in frequency, chief information security officers and C-suite executives must work more closely together.

The U.S. Capitol building in Washington

GSA’s entity validation request for proposal is flawed

The plan to create a government-run identifier raises intellectual property concerns and duplicates private sector efforts.

aerial view of pentagon government security dv1282020

Pentagon CIOs struggle with legacy tech, security. Sound familiar?

Defense Department tech chiefs working to modernize sprawling IT infrastructure encounter similar hurdles — if on a larger scale — as CIOs in other agencies and the private sector.

Load More