Security / Features

CISO proposes cybersecurity co-op to fend off hackers

The CISO of Rockwell Automation thinks a cybersecurity co-operative, comprised of top information security engineers from several companies, could serve as a salve to the talent shortage and also offer and an improvement over managed security service providers.

Written by Clint Boulton23 Nov. 15 16:00

Google+ updates aim to breathe new life into ailing social network

Google whittled down its Google+ platform to the bone as part of a new redesign that highlights groups and topics. But does the latest batch of changes represent a new beginning for the struggling social network, or the beginning of the end?

Written by Matt Kapko20 Nov. 15 17:56

5 email helpers you need to install right now

Email overload is a fact of daily business life. Or is it? While plenty of applications promise to help you manage the morass of messages munging up your mailbox, these five may actually deliver on those promises.

Written by John Brandon18 Nov. 15 16:10

How to crowdsource your way to better security

Synack, a company founded by former NSA analysts, attempts to leverage the best of man and machine approaches to provide enterprise cybersecurity protection.

Written by Sharon Florentine18 Nov. 15 15:27

10 dumb security mistakes sys admins make

Do as I say, not as I do: Admin mistakes often surpass the severity of those made by users. Here are 10 of the most common -- and their remedies

Written by Fahmida Y. Rashid18 Nov. 15 14:00

What 5 recent Facebook changes mean to you

Facebook’s latest overhauls include updates to video, search, notifications and more. Here’s what you need to know.

Written by Kristin Burnham17 Nov. 15 15:43

How to recognize an online fraudster

The capability to profile potential cybercriminals, along with the implementation of chip-and-pin credit cards, may produce a reduction in the amount of money lost to online fraud each year. But that doesn’t mean the threat will go away entirely.

Written by Jen A. Miller11 Nov. 15 16:40

Government CIOs and CISOs under siege by insider threats

As the Office of Management and Budget rolls out a framework to help agencies advance their cybersecurity posture, a new report highlights pervasive vulnerabilities from insiders.

Written by Kenneth Corbin09 Nov. 15 17:51

Is it time for Identity as a Service?

The concept of security these days goes well beyond insisting on complicated passwords. Are you sure your company is up to the task?

Written by Mary Branscombe09 Nov. 15 15:15

007 Tips for keeping your business as secure as MI6

Criminal organizations don’t have James Bond’s resources, but are sophisticated and well funded so you have to continually up your efforts to reduce the threat surface

Written by By Ryan Barrett, VP of privacy and security, Intermedia06 Nov. 15 00:24

5 signs your Web application has been hacked

Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all

Written by Fahmida Y. Rashid02 Nov. 15 14:00

CISA won’t do much to turn threat intelligence into action

With the Cybersecurity Information Sharing Act (CISA) the feds are trying to make it more attractive to share threat intelligence, but it won’t do much to help businesses deal with the high cost of sorting through what can be an overwhelming flow of possible security incidents.

Written by Tim Greene02 Nov. 15 13:29

Market Place