Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands

security threat - circuit board-hand knocking over a chess piece

locks on binary code

Improving security with diversity beyond the checkbox

Security and diversity mean being compliant and fair, but also mean you need to get the widest possible range of perspectives.

facebook logo large
By

Facebook security chief Alex Stamos reportedly planning to leave

Amid the mounting crisis from the Facebook/Cambridge Analytica scandal, sources say Facebook's security chief plans to leave the company.

security automation robot protects defends from attack intrusion breach

The future of computer security is machine vs machine

Better security automation at the OS level and via cloud services will force hackers to respond in kind.

CSO slideshow - Insider Security Breaches - Two-faced businessman removes his mask in a binary world

Insider threat examples: 7 insiders who breached security

You can build a wall, set up perimeter defenses, and spend massive resources maintaining it all. But if your enemy is within, that wall will do you no good.

By

North Carolina police are investigating crimes by using area-based search warrants to force Google to hand over data about all mobile devices near crime scenes.

big data laptop analytics data science

Leveraging analytics to improve security

Turn big data analytics to provide insight into everything going on within an environment.

supply chain management logistics - ERP - Enterprise Resource Planning

8 questions to ask about your industrial control systems security

Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems?

anti facebook primary
By

Facebook suspends firm that took 50M users' data, says it wasn't a breach

Facebook suspended Trump-linked data firm Cambridge Analytica, which pilfered 50 million Facebook users’ data, claiming the collected personal data was not the result of a breach.

jobs collaboration careers network

Security executives on the move and in the news

Find up-to-date news of CSO, CISO and other senior security executive appointments.

cloud security

Palo Alto Networks buys Evident.io, extends its cloud security solution

With the Evident Security Platform, Palo Alto Networks customers get a single dashboard to quickly find cloud security vulnerabilities and then see how to correct them.

European Union [EU] flag and binary code

GDPR: Look out for 'right to be forgotten storms' ahead

Thousands of EU citizens may ask data controllers to erase their records by the end of May. Will organizations be ready for this coming GDPR storm?

young man using a laptop with a security display in the background
By

Pwn2Own: Microsoft Edge and Apple Safari fall on day 1

On day one of Pwn2Own, Microsoft Edge and Apple Safari were pwned, and the hack of Oracle VirtualBox was a partial success.

hot and cold fire and ice clash temperature

8 hot cyber security trends (and 4 going cold)

What trends do security pros have their eyes on? Their answers run the gamut from tools and technologies to threats, tactics, and training.

security vulnerabilities such as hackers and cyberattacks

Vengeance by DDoS: No one is immune

The DDoS attack is showing up as one of the tools used to extract vengeance against companies, organizations, and individuals. Companies need a defense plan.

amdryzen
By

Researchers find 13 critical flaws in AMD's Ryzen and Epyc chips

Researchers accused of ignoring responsible disclosure claim AMD chips are riddled with critical flaws and backdoors; AMD says it is investigating.

abstract data stream

Avoiding security event information overload

Choose a security event information management (SEIM) vendor that helps you focus on only the security event data that needs to be investigated.

futuristic user interface - digital transformation

What is security’s role in digital transformation?

Digital transformation is front of mind for many senior executives, but too often security is left behind.

security threats and vulnerabilities
By

Severe flaws could turn your smart camera into someone else's surveillance tool

Researchers from Kaspersky Lab ICS CERT found 13 severe security flaws that could turn a popular smart camera into a device an attacker could use to spy on you.

Load More