Look to these clever open source tools to keep secrets out of source code, identify malicious files, block malicious processes, and keep endpoints safe
Security / Reviews
If you want to protect sensitive data -- especially if you’re sending it via email or via an online service -- one of these five encryption programs can help.
NetSkope edges CipherCloud and Bitglass in test of three ingenious and powerful cloud access security brokers.
New ‘smart’ tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift.
The 2016 presidential contest may the first ever to focus on the impact of the H-1B visa program on U.S. workers, which makes the arrival of a new book about the issue especially timely.
I once co-wrote a book on enterprise email where I likened email encryption to a "sucking chest wound." That was in 1997, when you had to do all the encryption key management on your own, a daunting task to say the least.
The old days of straightforward antivirus software packages are gone -- victim of a changing threat scene in which the dangers are more complex than ever and come from multiple sources.
Once upon a time, Symantec's brand of Norton security software had one of the most confusing lineups around -- products included Norton 360, <a href="http://www.computerworld.com/article/2488677/application-security/7-all-in-one-security-suites-anti-malware-for-all-your-devices.html?nsdr=true&page=5">Norton 360 Multi-Device</a>, Norton Anti-Virus and Norton Internet Security. Trying to decide which product was the best for you -- not to mention the best priced -- was no picnic.
McAfee LiveSafe is the best product in McAfee's sizable security portfolio. Its suite offers protection for an unlimited number of Windows PCs, Macs and Android and iOS devices, along with a Web dashboard. There's 1TB of cloud-based storage as well. The whole thing is available for $60 per year.
Our Amazon Echo, a voice-controlled appliance--for want of a better word--arrived on May 17 and we've been using it all week. As Prime members, we paid $100 for ours, but the list price is $200. While some parts are beautifully done, the information services at the back end have a long way to go before the Echo is more than a novelty.
When I bought my iPhone 6 earlier this year, I also purchased a simple, transparent case to protect it; the case cost me $35.
The number and complexity of cyber threats leveled against enterprises of all sizes these days is staggering. There's everything from advanced persistent threats created by well-sponsored nation states to disgruntled <a href="http://www.networkworld.com/article/2692093/security0/data-protection-165097-disgruntled-employees-lash-out.html">insiders</a> looking to make a fast buck or enact revenge for some perceived wrongdoing.
Back in January 2013, BlackBerry gave me its first BlackBerry 10 smartphone, the Z10, for review. It also gave me a "reviewer's kit" composed of a number of accessories: a case, screen cleaner cloth and a "battery charger bundle," among other things.
It's no stretch to say that ads are what make the Web go 'round. The content you're reading right now? Paid for by ads. Google, Facebook, Pandora, YouTube? Driven by ads. This is not a new concept: TV and radio have relied on commercials since their earliest days. Because, let's face it, <em>something</em> has to pay for all the free programming and services.
In the real estate world, the mantra is location, location, location. In the network and server administration world, the mantra is visibility, visibility, visibility. If you don't know what your network and servers are doing at every second of the day, you're flying blind. Sooner or later, you're going to meet with disaster.
Whatever your primary OS, Linux distro Tails 1.0 offers a plethora of security features to help you work online without worrying about privacy issues.
Linux users who want to avoid browser-based Twitter apps can try out these five local clients -- including one that still uses a command-line interface.
You can't see some malware until it's too late. Sophisticated attacks arrive in pieces, each seemingly benign. Once these advanced attacks reassemble, the target is already compromised.
If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.
Everyone needs a Wi-Fi spectrum analyzer, but there are times when analyzing cellular spectrum is also essential. Fluke Networks' new AirMagnet Spectrum ES provides a broad range of capability at a very attractive price. Spectral analysis, a longstanding fixture in electronics and manufacturing test, and, more recently as a valuable tool for understanding coverage, interference, and other elements of Wi-Fi, is the art and science of extracting meaning and insight from wireless systems at Layer 1 -- radio waves.
Different types of analysis suit different customer strategies.
- Participate in this market research and go into the draw to win a Lego Death Star, (valued at $999).
- WIN a HTC Vive Kit valued at $1399, take this 3 minute survey for your chance to WIN!
- Answer 5 quick questions and you could win a Lego Mindstorm EV3, (valued at $499).
- 6 cities | 20 exhibitors | International & local keynotes | Hear from Mark Loveless 'Simple Nomad' & Jeff Lanza Former FBI - Save your seat at CSO Perspectives Roadshow
- nbn takes the Sunshine Coast Regional Council to court
- Turnbull Government launches Joint Cyber Security Centre
- HPE’s global first quarter net revenue dips $US1.3B year on year
- Netcomm Wireless fills vacant CEO spot to steer company growth
- NEXTDC posts record half year financials as multi-million dollar investment kicks off
- Uber rejects claims it stole Waymo's self-driving car tech
- Microsoft's support rules for Windows 10 LTSB void allure to enterprise customers
- Afraid of A.I. taking your job? Yep, you likely are
- Google discloses unpatched IE vulnerability after Patch Tuesday delay
- FCC puts the brakes on ISP privacy rules it just passed in October
- IAB aims for simplicity in digital advertising with new councils and approach
- Freeview appoints new head of marketing
- CMO's top 8 martech stories for the week - 23 February 2017
- Qantas reports solid financials; highlights customer data and digital as competitive advantage
- How Nude by Nature is using data to prove digital's worth