Security

Security news, trends, analysis and practical advice

code hacker cyberespionage eye data
uber

video

RSA demo: TruStar anonymizes incident data to improve information exchange

TruStar's head of product, Shimon Modi, shows CSO Online's Steve Ragan how his company is changing the game when it comes to incident reporting for companies.

video

Why cyber-robotics is key to cybersecurity's future

Chad Holmes, Principal of Ernst & Young LLP sits down with Network World's Neal Weinberg to talk about how cyber-robotics will help shape the future of cybersecurity.

RSA

Here’s how the U.S. government can bolster cybersecurity

Almost 20 years ago, Chris Wysopal was among a group of hackers who testified before Congress, warning about the dangers of the internet.

windows10

Why February's Patch Tuesday is delayed

After a short break since our Patch Tuesday debugged analysis in January, it looks like we are going to have some delay with Patch Tuesday in February due to a last minute technical issue with the Microsoft release process.

20160224 stock mwc freeway cars traffic barcelona

Insecure Android apps put connected cars at risk

Android applications that allow millions of car owners to remotely locate and unlock their vehicles are missing security features that could allow hackers to easily hijack their functionality.

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need a plan for negotiating with people who take their data hostage.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

dsc05783

Experts at RSA offer up their best cybersecurity advice

Come to the RSA show, and you’ll find plenty of cybersecurity technology. The top vendors from across the industry are here, showing products for fighting ransomware, preventing data breaches and more.

video

Why (or where) many security programs fail

At RSA 2017, CSO’s Steve Ragan chats with security expert Ira Winkler about where many security programs are failing within companies, as well as his concept of “advanced persistent security.”

malware attack cyberespionage code hacker

Israeli soldiers hit by Android malware from cyberespionage group

More than 100 members of the Israel Defense Forces, the majority of them stationed around the Gaza strip, fell victim to a cyberespionage attack that used malicious Android applications to steal information from their mobile devices.

video

How the Cyber Threat Alliance works to fight cybercrime

At RSA 2017, Derek Manky, Global Security Strategist at Fortinet, talks about the mission and goals of the Cyber Threat Alliance, which shares malware information between members to improve defenses in the cybersecurity space.

video

How blockchain can help drive cybersecurity

At RSA 2017, security expert Konstantin Karagiannis (CTO at BT North America) gives Network World an overview of blockchain security and how it could help shape the future of cybersecurity.

11 hacker keyboard user laptop

7 tips to turn threat data into true threat intelligence

Threat intelligence can be your best friend or your worst enemy. Here are some tips to make sure you are making the most of it.

microsoft stock campus building

Microsoft's monthlong patch delay could pose risks

There won't be any patches from Microsoft this month, as the company has decided to bundle them together with the patches scheduled for March.

NSA headquarters

Tech groups gear up for a big FISA surveillance fight

A controversial provision in U.S. law that gives the National Security Agency broad authority to spy on people overseas expires at the end of the year, and six major tech trade groups are gearing up for a fight over an extension.

H-1B visa man entering U.S. with briefcase

Should security pros get special H-1B visa consideration?

The skills, education and experience that would garner additional merit have not been discussed publicly, but some cybersecurity leaders and industry-watchers say that special consideration should be given to H-1B visa applicants with...

Privacy (4)

Legislation revived to curb warrantless geolocation tracking

U.S. legislators have reintroduced bills that would place curbs on warrantless access by the government to electronically generated geolocation information of Americans, including on the use of cell-site simulators that can capture...

video

The Challenges of Identity in the Cloud

JD Sherry, VP of Cloud Security at Optiv talks to Infoworld's Fahmida Rashid about the challenges of identity in cloud environments.

Load More