Security

Security | News, how-tos, features, reviews, and videos

Insider Pro  >  Plug-and-play network security
Network World [slideshow] - Top 10 Supercomputers 2018 [slide-01]

CSO  >  macOS Mojave endpoint security

Reviewing endpoint protection products (and picking the Top 10)

As you add more and more smartphones, laptops, tablets and other wireless devices that need to connect into your network remotely, how do you ensure you're secure? Download this report to evaluate the best options.

CSO > Security mechanisms vs. fiery threats

The role of next-gen firewalls in an evolving security architecture

As the commercial enterprise firewall approaches its 30th birthday, it is hard to overstate how dramatically the product has evolved. This 2,700-word research report looks the current state of next-generation firewall technology.

ip guide to top security certifications tablet

Guide to top security certifications

Security professionals are in demand and with the right certification, you’re in even higher demand. To help you decide which certs are for you, we’ve compiled a list of top security certifications -- broken down by category...

business decision making 166291792

Developing an information security decision-making matrix

It is possible to create a simple, bright-line means of triaging engagements to determine whether heightened security and privacy measures should be required.

5G mobile wireless network technology emerging from smartphone

Privacy by design: Cybersecurity and the future of 5G

History has shown that when we rush to expand computing power and interconnectivity – IoT and cloud tech, to name two – we expose ourselves to new kinds of cyberattacks and bad actors. Can we get it right with 5G?

GDPR / data privacy / protection

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

digital currency

How blockchain is becoming the 5G of the payment industry

New blockchain-based financial networks like the one launched by IBM last week will enable faster and more transparent cross-border payments and eventually become the platform for retail and other consumer transactions.

big data merger and acquisition big business smb

Top 9 cybersecurity M&A deals of 2018 and 2019 (so far)

2018 was a busy year for mergers and acquisitions in the cybersecurity industry. Here's why the M&A market is so hot and what to expect in 2019.

5 password best practices unique passwords authentication

The best password advice right now (Hint: It's not the NIST guidelines)

Short and crackable vs. long, complex and prone to reuse? The password debate rages on, but this columnist has a change of mind.

5 gdpr compliant notification documentation

Report: Over 59,000 GDPR data breach notifications, but only 91 fines

The low number of fines relative to the volume of reported breaches might be due to over-extended regulators, says a DLA Piper report.

5 password best practices unique passwords authentication

12 famous passwords used through the ages

Passwords seem like a recent thing, but they've been in use for a long time. Here are a dozen of the more memorable ones.

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS protection, mitigation and defense: 8 essential tips

Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.

Windows security and protection [Windows logo/locks]

Experience an RDP attack? It’s your fault, not Microsoft’s

Follow Microsoft's basic security guidelines for Remote Desktop Protocol and you'll shut down hackers who try to exploit it.

threat detection

EDR is dead! Long live XDR!

Endpoint detection and response has been a valuable technology for years, but its limited view is leaving many blind spots. It’s time the industry evolved to XDR.

lock binary circuits

Do you still need a firewall?

Traditional firewall software no longer provides meaningful security, but the latest generation now offers both client-side and network protection.

primary laptop with certificate degree for technology

Top bachelors and masters cybersecurity degree programs

These are some of the best on-campus and online cybersecurity degree programs helping to meet the cybersecurity job demand.

scale balance compare apple os versus windows 10 os

Microsoft Windows 10 vs. Apple macOS: 18 security features compared

Here's how the world's two most popular desktop OSes keep systems and data safe from malware, unauthorized access, hardware exploits and more.

Government building with greek columns

What is FedRAMP? How cloud providers get authorized to work with the U.S. government

The process for getting the FedRAMP seal of approval is complex, but it can ultimately be lucrative for companies that meet the security requirements.

Load More