Security

Security | News, how-tos, features, reviews, and videos

career roadmap primary
Cybersecurity awareness  >  A weary businessman holds hand to forehead at security training.

security threats and vulnerabilities

7 mobile security threats that may catch you by surprise

Even if you're usually savvy about cybersecurity, anyone can have a vulnerable moment (in our writer's case, it was his mother's funeral).

Encrypted blocks of multicolored data cubes rolling out.

Has the quantum crypto break already happened?

Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe.

A business man touches a futuristic lock + circuit board security interface.

Review: How CybeReady delivers targeted, timely security awareness training

Users will always be the last line of defense for email-based attacks. The CybeReady platform effectively trains them to spot phishing and other dangers, unobtrusively and as-needed.

holiday e commerce shopping holiday hacking security breach retail security by rupixen via unsplash

Fighting holiday fraud: 5 ways ecommerce retailers can boost security

Everyone loves online shopping -- especially cybercriminals. If you’re a small or midsize ecommerce retailer you are the biggest target this holiday season, but it’s not too late to protect yourself and your customers.

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

online certification mortar board graduate student study certificate  by pettycon pixabay and janjf

Earn your IoT security certification

Insider Pro is teaming up with CertNexus to offer subscribers access to an online course that leads to a Certified IoT Security Practitioner (CIoTSP) certification.

nw iot news internet of things smart city smart home7

IoT roundup: Carriers expand NB-IoT, Congress eyes IoT security …

A powerful IoT networking technology used by the major carriers continues to gain ground, Congress makes noise about training and a prominent researcher warns of security trouble ahead.

Cybersecurity  >  Email security threats, such as phishing

Review: How Avanan defends cloud-based email platforms

Avanan can catch the advanced threats that Microsoft, Google or other cloud-based email providers miss, identifying dangers like phishing, malware, data leakage and even full account takeovers.

CSO  >  danger / security threat / malware / biohazard symbol in data center

Review: Morphisec scrambles memory to thwart advanced attacks

With Morphisec, you get a full spectrum of protection that is more complete than any antivirus program alone.

windows 7 logo in the rear view mirror

9 ways to use Windows 7 (safely) when support ends

With Microsoft's support ending in January, our Windows 7 Survival Guide for 2020 offers ways to protect your older machines that can't or won't be upgraded.

budget piggy bank spending savings security spending

Security spending up, but adoption of cutting-edge tools is slow

While security budgets are expected to increase over the next year, it’s not clear that spending is aimed at the right problems or that IT is up-to-date on the latest security practices. (Download our research report.)

endpoint security hacker vulnerablility secure mobile security app

Will 5G increase mobile security?

We love our smartphones, but there's a dark side. Their prevalence and users’ tendencies to connect over public Wi-Fi make mobile devices a common target of bad guys. Analyst Jack Gold looks at how to mitigate the risk.

blockchain crypotocurrency bitcoin by akinbostanci getty

5 industries that will be disrupted by blockchain

Here are five major industries that will benefit from blockchain technology in the near future: financial services and banking, government, healthcare, energy, and transportation and logistics.

security policy primary

How to create an effective security policy (and 4 templates to get you started)

Download our ebook that features templates for security policies on passwords, acceptable use, email, access control, BYOD and incident response.

iot internet of things chains security by mf3d getty

IoT roundup: Security holes abound, GE Digital makes noise and more

This week, we look at IoT security holes -- both usual and unusual -- an IIoT player makes a move, and mergers and partnerships worth noting.

1 fake profile

Deepfakes get real (and real easy)

As if deepfake technology wasn’t scary enough. Expect the panic to reach new heights now that it’s easily accessible to everyone. Prepare for deepfakes to revolutionize social engineering.

orange monitors with lock icon network security cyber threat

Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

The secret to the platform’s success is the deployment of fully autonomous agents that act as both sensors and threat remediators and are capable of taking actions on their own.

network security / network traffic scanning

3 ways to improve PC security

Insider Pro columnist Jack Gold writes that organizations must focus on three key areas if they want to protect their PCs -- and ultimately the entire organization -- from security breaches.

Load More