Privacy

Privacy | News, how-tos, features, reviews, and videos

data security / padlock / binary code / digital display
A magnifying lens examines top secret information amid binary code.

CSO  >  Arrows that have missed their target.

Why coronavirus contact tracing apps are failing

Security, yes. But the biggest problem to adoption is staring us all in the mirror. Here's what that means for you and your organization.

Network security  >  simplified / centralized / unified

Zero Trust: Protecting your company inside and out

The traditional castle-and-moat security model where users, once inside the firewall, were automatically trusted has long been outdated. What if you can't trust anyone in or outside your network?

ip winners and losers chess check mate by rawf8 getty images 1190439498

Technology winners and losers in the days of COVID-19

The coronavirus pandemic is revealing just where our technology is up to the challenge and where it's failing.

10 untruthful lies liar untrustworthy

Google and Microsoft have gone too far

Google and Microsoft are using dark pattern design to trick or force users to do things they never intended. Is it time to switch to more ethical search engines? (We list 10 alternatives.)

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

man hiding behind laptop computer sneaky employee hiding censorship by xesai getty images

What happens when every nation censors search results globally?

The dam has burst on governments asserting their right to censor the internet worldwide. Welcome to the dark side of information globalization.

security policy primary

How to create an effective security policy (and 4 templates to get you started)

Download our ebook that features templates for security policies on passwords, acceptable use, email, access control, BYOD and incident response.

GDPR / data privacy / protection

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

Load More