Look to these clever open source tools to keep secrets out of source code, identify malicious files, block malicious processes, and keep endpoints safe
Security / Reviews
If you want to protect sensitive data -- especially if you’re sending it via email or via an online service -- one of these five encryption programs can help.
NetSkope edges CipherCloud and Bitglass in test of three ingenious and powerful cloud access security brokers.
New ‘smart’ tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift.
The 2016 presidential contest may the first ever to focus on the impact of the H-1B visa program on U.S. workers, which makes the arrival of a new book about the issue especially timely.
I once co-wrote a book on enterprise email where I likened email encryption to a "sucking chest wound." That was in 1997, when you had to do all the encryption key management on your own, a daunting task to say the least.
The old days of straightforward antivirus software packages are gone -- victim of a changing threat scene in which the dangers are more complex than ever and come from multiple sources.
Once upon a time, Symantec's brand of Norton security software had one of the most confusing lineups around -- products included Norton 360, <a href="http://www.computerworld.com/article/2488677/application-security/7-all-in-one-security-suites-anti-malware-for-all-your-devices.html?nsdr=true&page=5">Norton 360 Multi-Device</a>, Norton Anti-Virus and Norton Internet Security. Trying to decide which product was the best for you -- not to mention the best priced -- was no picnic.
McAfee LiveSafe is the best product in McAfee's sizable security portfolio. Its suite offers protection for an unlimited number of Windows PCs, Macs and Android and iOS devices, along with a Web dashboard. There's 1TB of cloud-based storage as well. The whole thing is available for $60 per year.
Our Amazon Echo, a voice-controlled appliance--for want of a better word--arrived on May 17 and we've been using it all week. As Prime members, we paid $100 for ours, but the list price is $200. While some parts are beautifully done, the information services at the back end have a long way to go before the Echo is more than a novelty.
When I bought my iPhone 6 earlier this year, I also purchased a simple, transparent case to protect it; the case cost me $35.
The number and complexity of cyber threats leveled against enterprises of all sizes these days is staggering. There's everything from advanced persistent threats created by well-sponsored nation states to disgruntled <a href="http://www.networkworld.com/article/2692093/security0/data-protection-165097-disgruntled-employees-lash-out.html">insiders</a> looking to make a fast buck or enact revenge for some perceived wrongdoing.
Back in January 2013, BlackBerry gave me its first BlackBerry 10 smartphone, the Z10, for review. It also gave me a "reviewer's kit" composed of a number of accessories: a case, screen cleaner cloth and a "battery charger bundle," among other things.
It's no stretch to say that ads are what make the Web go 'round. The content you're reading right now? Paid for by ads. Google, Facebook, Pandora, YouTube? Driven by ads. This is not a new concept: TV and radio have relied on commercials since their earliest days. Because, let's face it, <em>something</em> has to pay for all the free programming and services.
In the real estate world, the mantra is location, location, location. In the network and server administration world, the mantra is visibility, visibility, visibility. If you don't know what your network and servers are doing at every second of the day, you're flying blind. Sooner or later, you're going to meet with disaster.
Whatever your primary OS, Linux distro Tails 1.0 offers a plethora of security features to help you work online without worrying about privacy issues.
Linux users who want to avoid browser-based Twitter apps can try out these five local clients -- including one that still uses a command-line interface.
You can't see some malware until it's too late. Sophisticated attacks arrive in pieces, each seemingly benign. Once these advanced attacks reassemble, the target is already compromised.
If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.
Everyone needs a Wi-Fi spectrum analyzer, but there are times when analyzing cellular spectrum is also essential. Fluke Networks' new AirMagnet Spectrum ES provides a broad range of capability at a very attractive price. Spectral analysis, a longstanding fixture in electronics and manufacturing test, and, more recently as a valuable tool for understanding coverage, interference, and other elements of Wi-Fi, is the art and science of extracting meaning and insight from wireless systems at Layer 1 -- radio waves.
Can the rise in importance of technology and data to enterprises mean that the ‘CIO to CEO’ route will finally open for more business technologists? What are the new skill sets that are necessary? And which elements of the old role can be safely jettisoned? Find out more in this insightful whitepaper.
- Compliance breaches dog Telstra’s structural separation
- Monetising malware: How cyber crooks are innovating like legitimate business
- Govt welcomes new suppliers to its cloud services panel
- Invigor strikes $10M Sprooki acquisition deal for Amazon "antidote"
- Melbourne telco liquidated leaving $2M in debts
- Oracle unveils AI-powered apps for cross-channel marketing, chatbots and new content cloud
- Why Marketo's CMO thinks advocacy starts from the inside out
- Improving omni-channel customer experience at La-Z-Boy, Denon + Marantz and Pello
- How HP reclaimed the title of world's top PC maker from Lenovo
- Report shows CMOs are not happy with customer retention