Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands

tools and a tablet forming the shape of a house/building

How to test wireless M2M IoT devices for network readiness

Machine-to-machine (M2M) communication is a significant and growing subset of the larger Internet of Things (IoT) movement, so you have to ask, “Is my network ready for machine-to-machine (M2M) devices?” IoT can include vehicles...

salted hash thumbnail final
video

Managing open-source mobile security and privacy for activists worldwide | Salted Hash Ep 18

Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the...

internet things iot

Tips for securing IoT on your network

Judging by all the media attention that The Internet of Things (or IoT) gets these days, you would think that the world was firmly in the grip of a physical and digital transformation. The truth, though, is that we all are still...

Malware virus

Researchers find malware samples that exploit Meltdown and Spectre

As of Feb. 1, antivirus testing firm AV-TEST had found 139 malware samples that exploit Meltdown and Spectre. Most are not very functional, but that could change.

SHEp17
video

Spectre and Meltdown | Salted Hash Ep 17

What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.

amdlogo

AMD plans silicon fix for Spectre vulnerability

AMD intends to have a silicon fix for the variant 2 of the Spectre exploit, the only one of the Meltdown and Spectre exploits it’s vulnerable to, by 2019.

nordvpn

Get 3 Years of NordVPN Service for Just $2.75 Per Month

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.75 per month for 3 years, if you sign up right now.

open source alternatives routing firewall 1

How to eliminate the default route for greater security

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Part of the reason is...

bose soundsport free workout

IoT and the law of unintended consequences

Strava’s fitness app usage heatmap accidentally reveals military deployments — and it won’t be the last time good IoT intentions lead to unanticipated problems.

bad security habits

What is microsegmentation? How getting granular improves network security

Microsegmentation is a way to create secure zones in data centers and cloud deployments that allow you to isolate workloads and protect them individually.

sequence 01.00 29 58 30.still001
video

Ready for the EU's GDPR compliance deadline? Many companies aren't | Salted Hash Ep 16

CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline.

program dirty 2018.01.25 11.10.07.00 00 15 31.still002
video

Tech Talk: IT trends for 2018 – passwords on the way out, blockchain evolves

Our tech panel envisions the end of passwords, looks at how blockchain is evolving, details why 'serverless' computing is a boon to devs and wonders why Apple's HomePod seems late to the game.

program dirty 2018.01.25 11.10.07.00 01 18 51.still001
video

Tech Talk: The beginning of the end of the password in 2018

Hackers can crack them, and users are careless with them. Passwords have long been problematic, but they are getting renewed attention after a series of major breaches. Our panelists look at the coming technology to help with password...

iot security ts

The moving target of IoT security

As the explosive growth of IoT tech continues; businesses, vendors and consumers all have to confront the issue that the world is more connected than ever before, with potentially gigantic consequences. The central problem with...

program dirty 2018.01.23 12.03.01.00 00 36 44.still001
video

Mingis on Tech: 2018 – the year blockchain breaks out

Blockchain continues to evolve and grow, as more companies test it out. It's now seen as the heart of a new global shipping platform that could save companies billions of dollars and as the underpinning for a P2P cloud storage...

amazon shredder

Get 29% Off This 6-Sheet Micro-Cut Paper and Credit Card Shredder

This powerful micro-cut shredder turns a letter-sized sheet into 2,235 pieces of confetti, up to 6 sheets at a time. It can also destroy credit cards, rendering them useless.

sequence 01.00 37 12 47.still001
video

The people you call when you've had a breach | Salted Hash Ep 15

Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018.

data breach security threat lock crime spyware

Configuration errors in Intel workstations being labeled a security hole

The issue is in specific desktops and laptops but is not a technical one, company says.

Load More