Cyberattacks

Cyberattacks | News, how-tos, features, reviews, and videos

network security lock padlock breach collaboration
cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself.

Google Gmail / email / laptop / messaging / collaboration

5 keys to supporting telework effectively and securely

Suddenly countless numbers of people are working from home. This massive shift in work processes can have huge repercussions from a security, privacy, regulatory and data governance standpoint.

A man with an umbrella stands waist-deep in water as rain continues to fall.

5 steps to create a security incident response plan

Creating an incident response plan can seem like a daunting task, but there are ways to break the process down into manageable pieces. (Plus: Video on how to create a pandemic disaster recovery plan.)

Multifactor authentication  >  Mobile phone verification of a permission request for laptop login.

The trouble with 2fa

With a large percentage of your workforce now working remotely, two-factor authentication (2fa) can make them (or your company data) safer online. But how you're doing it now probably isn't helping much at all.

security threats and vulnerabilities

How to protect remote workers from the coronavirus crime wave

As predicted, the coronavirus crisis is bringing out the worst in cybercriminals. But the attacks are really just old exploits modified to exploit the new coronavirus context. Here’s how to beat them.

Tiny figures are drawn toward a big, glowing lightbulb with a security shield. [idea/opportunity]

Next-generation endpoint security goes beyond the endpoint

AI and behavioral analysis are key to elevating the level of security for devices and back-end systems and are a prerequisite for IoT devices and services. Is your vendor moving in the right direction?

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Securing the IoT is a nightmare

Currently, we have over 26-billion IoT devices running in our workplaces, offices and homes. If you're looking for an IoT security scorecard, it looks something like this: Security Threats: 26,000,000,000, IoT Secure Devices: 0.

'I Voted' sticker / abstract data encryption / secure voting in elections

Why manipulation campaigns are the biggest threat facing the 2020 election

This era of political espionage is rooted in manipulative ads, fake news articles and other forms of digital content. It's one of the nation’s greatest threats, especially as we approach the 2020 presidential election.

cybersecurity skills and talent shortage

7 ways to narrow the cybersecurity skills gap in 2020

Over the long haul, government intervention, public-private partnerships and an integrated industry effort may be needed to address challenges in filling cybersecurity positions.

cyber threat security compromised vulnerable men on the street

Cybersecurity in 2020: Vigilance and the human element

Todd Inskeep, of Booz Allen Hamilton and the RSA Conference Advisory Board, writes that individuals must remain vigilant to stay a step ahead of those wishing to inflict chaos. Here’s how humans and technology can work together in...

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

CSO  >  danger / security threat / malware / biohazard symbol in data center / servers

Review: Morphisec scrambles memory to thwart advanced attacks

With Morphisec, you get a full spectrum of protection that is more complete than any antivirus program alone.

budget piggy bank spending savings security spending

Security spending up, but adoption of cutting-edge tools is slow

While security budgets are expected to increase over the next year, it’s not clear that spending is aimed at the right problems or that IT is up-to-date on the latest security practices. (Download our research report.)

5G mobile wireless network technology emerging from smartphone

Privacy by design: Cybersecurity and the future of 5G

History has shown that when we rush to expand computing power and interconnectivity – IoT and cloud tech, to name two – we expose ourselves to new kinds of cyberattacks and bad actors. Can we get it right with 5G?

1 volume of data breach pile of paper confidential documents

The politics of ‘Have I Been Pwned’

Data breaches are not created equal. Business leaders and security managers must beware the dangers of FUD and hype created around notification of old breaches.

Load More