Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Even encrypted medical record databases leak information

A new study from Microsoft researchers warns that many types of databases used for electronic medical records are vulnerable to leaking information despite the use of encryption.

Five steps to optimize your firewall configuration

95% of all firewall breaches are caused by misconfiguration. Here's how to address the core problems


FTC website

Court: FTC can take action on corporate data breaches

The US Court of Appeals has ruled that the FTC mandate to protect consumers against fraudulent, deceptive and unfair business practices extends to oversight of corporate cybersecurity efforts -- and lapses. But security experts are...

video

What's broken in the security industry?

At the recent Black Hat Conference, CSO asked security industry officials about what parts of the industry are broken or needs fixing. See what they had to say in this video.

video

How to Speak Security

At the recent Black Hat Conference, CSO chats with security industry officials about how InfoSecurity leaders can interact with other parts of the business when it comes to data security issues.

video

How is the CISO role evolving?

At the recent Black Hat Conference, CSO chats with security industry officials about how the CISO role has been changing, and whether the role reports to the CIO or Risk Management group.

video

Security Priorities and Challenges

At the recent Black Hat Conference, CSO asked security officials what is "top of mind" in terms of priorities and challenges in the information security industry.

video

What traits do security employers look for?

At the recent Black Hat Conference, CSO asked security officials what traits and skills they look for in employees they want to hire.

video

What Security Terms are Overhyped?

At the recent Black Hat Conference, CSO asked security industry officials what terms or phrases they feel are overhyped or misused.

james mobley

Cisco security chief: 4 things CISOs need to survive

Cisco’s security consulting chief James Mobley outlines four areas CISOs need to develop their skills in order to keep up with the rapidly changing needs of corporate security.

Victim of identity theft

Shopperz adware takes local DNS hijacking to the next level

The Shopperz adware program uses a cunning technique to make DNS (Domain Name System) hijacking harder to detect and fix.

black hat 2015

Black Hat survey reveals a disconnect between losses and security program focus

The recently published Black Hat Attendee Survey primarily focused on the concerns of practitioners, including how they actually spent their times and the losses that they incurred. For now though, the most notable statistic is the...

hacker backlit keyboard

The myth of the cybersecurity skills shortage

There seems to be a shortage of cybersecurity talent only because people are looking in the wrong places.

Security flaws in baby cam monitors

8 in 10 Internet-connected baby monitors receive 'F' grade for security flaws

Researchers reveal 10 new vulnerabilities in IoT baby monitors.

The unintended consequences of a RASP-focused application security strategy

RASP can help safeguard applications, but it isn’t a silver bullet

Web attack silently modifies DNS configurations in routers

Despite reports of hacking, baby monitors remain woefully insecure

A security analysis of nine baby monitors from different manufacturers revealed serious vulnerabilities and design flaws that could allow hackers to hijack their video feeds or take full control of the devices.

The RMS Titanic and cybersecurity

Famous shipwreck holds many lessons for the cybersecurity community.

checkpoint

Check Point’s SandBlast sandbox spells R.I.P for ROP attacks

Check Point is upgrading its sandboxing technology so it catches attacks earlier in the process and makes it harder for adversaries to evade detection. Called SandBlast, the new software monitors CPU activity looking for anomalies...

information security keyboard

How CISOs can beat the information security skills-gap

The information security skills gap may have become a huge issue for Chief Security Offices (CSOs) and Chief Information Security Officers (CISOs), but there are a number of ways infosec teams can work around the shortage so to...

doctor tablet

Study: 81% of large health care organizations breached

In the past two years, 81 percent of hospitals and health insurance companies have had a data breach, according to a report released by KPMG

Load More