Privacy

Privacy | News, how-tos, features, reviews, and videos

data security / padlock / binary code / digital display
A magnifying lens examines top secret information amid binary code.

CSO  >  Arrows that have missed their target.

Why coronavirus contact tracing apps are failing

Security, yes. But the biggest problem to adoption is staring us all in the mirror. Here's what that means for you and your organization.

Network security  >  simplified / centralized / unified

Zero Trust: Protecting your company inside and out

The traditional castle-and-moat security model where users, once inside the firewall, were automatically trusted has long been outdated. What if you can't trust anyone in or outside your network?

ip winners and losers chess check mate by rawf8 getty images 1190439498

Technology winners and losers in the days of COVID-19

The coronavirus pandemic is revealing just where our technology is up to the challenge and where it's failing.

A man with an umbrella stands waist-deep in water as rain continues to fall.

5 steps to create a security incident response plan

Creating an incident response plan can seem like a daunting task, but there are ways to break the process down into manageable pieces. (Plus: Video on how to create a pandemic disaster recovery plan.)

10 untruthful lies liar untrustworthy

Google and Microsoft have gone too far

Google and Microsoft are using dark pattern design to trick or force users to do things they never intended. Is it time to switch to more ethical search engines? (We list 10 alternatives.)

CSO slideshow - Insider Security Breaches - Spam email identified

Will spam die in 2020?

The problem with spam isn't that it's a time-wasting annoyance, but that it drives us away from phone calls and emails to bad media.

holiday e commerce shopping holiday hacking security breach retail security by rupixen via unsplash

Fighting holiday fraud: 5 ways ecommerce retailers can boost security

Everyone loves online shopping -- especially cybercriminals. If you’re a small or midsize ecommerce retailer you are the biggest target this holiday season, but it’s not too late to protect yourself and your customers.

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

man hiding behind laptop computer sneaky employee hiding censorship by xesai getty images

What happens when every nation censors search results globally?

The dam has burst on governments asserting their right to censor the internet worldwide. Welcome to the dark side of information globalization.

security policy primary

How to create an effective security policy (and 4 templates to get you started)

Download our ebook that features templates for security policies on passwords, acceptable use, email, access control, BYOD and incident response.

Load More
Recommended for You