Menu
security

security - News, Features, and Slideshows

security in pictures

News about security
Tutorials about security
  • How CISOs can create security KPIs and KRIs

    If your information security functions like most, it develops copious amounts of data about the business's security that it delivers on a regular basis. And typically it never gets read.

    Written by Thor Olavsrud26 June 15 03:07
  • Closing the security loop with automated incident response

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

    Written by By Cody Cornell, founder and CEO, Swimlane06 June 15 06:51
  • Breach detection: Five fatal flaws and how to avoid them

    IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization's attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations.

    Written by By Lior Div, Co-founder and CEO, Cybereason06 June 15 00:37
  • How to use Google's new privacy and security tools

    Google stores, manages and sometimes sells an astonishingly large and complex amount of user data. Unfortunately, that digital information isn't always kept secure or private, but Google puts some degree of control in the hands of its users. To offer you a little more control, Google this week rolled out an updated online hub designed to help manage privacy settings, called My Account, as well as a pair of tools that streamline the process of safeguarding user data.

    Written by Matt Kapko03 June 15 02:51
Features about security
  • Ashley Madison -- Can it possibly get any worse? (tl;dr: YES)

    The Ashley Madison hack continues to make headlines. Naturally, that's because the news keeps getting worse. Worse for website owners Avid Media Group. And worse for the REAL victims, more importantly -- the people named in the hacked data dump...

    Written by Richi Jennings25 Aug. 15 13:51
  • Hackers call Time on Ashley Madison -- with huge data dump

    Ashley Madison hackers released the site's user data, as threatened. Or, at least, that's what they say they've done. But it's likely that much of the data is forged or bogus in some way...

    Written by Richi Jennings19 Aug. 15 13:14
  • At what point do white hat hackers cross the ethical line?

    In recent months the news of Chris Roberts alleged hacking of an inflight entertainment system and possibly other parts of the Boeing 737 have sparked a wave of controversy. Public opinion was originally on Roberts' side, but the recent publication of the FBI affidavit changed that drastically. According to the affidavit, Roberts admitted to doing a live "pen-test" of a plane network in mid-air.

    Written by By Ondrej Krehel and Darin Andersen of Cyberunited Lifars15 Aug. 15 07:10
  • The six pillars of Next Generation Endpoint Protection

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

    Written by By Tomer Weingarten, CEO, SentinelOne15 Aug. 15 04:57

Whitepapers about security

Market Place

Computerworld
ARN
Techworld
CMO