Security

Security | News, how-tos, features, reviews, and videos

network security lock padlock breach

neon skull sign / danger / caution / threat

Brand reputation at risk

While leading in digital transformation, TMT companies are more vulnerable to cyber-threats, research finds.

dark secrets of enterprise architecture men meetng in dark tunnel

12 dark secrets of cloud security

The cloud is essentially a dark pool of computational power and that mystery can lull us into complacency. Here’s what you don’t know about keeping your data secure in the cloud.

cssg 018 thumb
video

How to manage Microsoft Windows BitLocker

Use these techniques to inventory your network to determine which devices have BitLocker.

tf19 041 thumb
video

What the FTC’s $5 billion fine really means for Facebook | TECH(feed)

Last week, the Federal Trade Commission hit Facebook with a $5 billion fine for mishandling user data. The fine comes after the FTC’s investigation following the Cambridge Analytica scandal. On this episode of TECH(feed), Juliet...

cssg 017 thumb
video

How to set up Microsoft Cloud App Security

This new add-on will let you set up alerts about suspicious sign-on activity for Office 365 and other cloud apps.

network security digital internet firewall binary code

Protecting data in an increasingly insecure world

Protecting data is only going to get tougher. Are CIOs ready to protect what is the most important enterprise asset?

it security lock cybersecurity breach alignment

How to better integrate IT security and IT strategy

Organizations see a future in which IT security is deeply woven into their overall IT strategy. Here’s how they plan to get there.

keep out sign do not tresspass privacy authentication access barbed wire by tim husser getty

Antitrust enforcers can think of privacy as a parameter of competition

But it is not likely to improve privacy protection very much.

paris tuileries garden facepalm statue

French judicial analytics ban undermines rule of law

The ban is likely unconstitutional in the United States.

delete button trash secure data deletion

Data deletion: Your data strategy’s greatest defense

If data is the new oil, safe handling is essential to avoiding the digital equivalent of a toxic spill. It all begins with a strong data deletion policy.

6 web forums

Is our obsession with regulation killing the web?

What started out as an open, connected and vastly unregulated platform of sharing information is consistently being crippled by legislation made by people who do not understand the fundamentals of technology. Unless we act fast, there...

girl hands privacy stop

As AI/ML permeates our lives, is privacy a thing of the past?

The World Economic Forum has brought together the most influential scientists, economists and entrepreneurs to deliberate on the positive and negative aspects of our digital future living and being in what we collectively are calling...

tt19 030 thumb
video

How updates to MongoDB work to prevent data breaches | TECH(talk)

CSO senior writer Lucian Constantin and Computerworld Executive Editor Ken Mingis talk database security and how MongoDB's new field-level encryption takes security to the next level.

tf19 036 thumb2
video

How the Huawei ban could become a security threat | TECH(feed)

We’ve already talked about how the Huawei ban may affect business, but how will it affect security? Google has already warned of security threats should the company be unable to send updates to Huawei’s Android-powered devices. And...

Boardroom chair_178764455

Security and the boardroom: From advantage to imperative

Detecting and mitigating cyber threats is getting tougher. A quarter of organization reports greater financial damages.

tt19 024 thumb
video

What do recent public SAP exploits mean for enterprises? | TECH(talk)

Recently released public SAP exploits (dubbed 10KBLAZE) could pose a security risk for thousands of businesses. Computerworld executive editor Ken Mingis and CSO Online's Lucian Constantin discuss the fallout of 10KBLAZE, and how...

dark secrets of enterprise architecture men meetng in dark tunnel

12 dark secrets of encryption

With data security a key concern across all systems, encryption is increasingly becoming the go-to solution. But encryption may be less of a sure thing than you think.

tf19 029 thumb2
video

WhatsApp attacked by spyware | TECH(feed)

WhatsApp’s recent spyware hack took advantage of a security vulnerability and allowed attackers to access private, digital communication. In this episode of TECH(feed), Juliet walks through the hack, who was affected and how you can...

Load More