security - News, Features, and Slideshows

Most popular

security in pictures

News about security
  • Older Dell devices also affected by dangerous eDellRoot certificate

    Users who have Dell Windows-based laptops, desktops, tablets and other devices that were bought before August should check if their systems have the self-signed eDellRoot certificate that can compromise their private communications.

    Written by Lucian Constantin26 Nov. 15 18:44
  • Australian quantum cyber security firm wins global award

    QuintessenceLabs, built out of Australian National University, has been internationally recognised as a leader in quantum cyber security by winning a global Security Innovation Network (SINET) award.

    Written by Rebecca Merrett24 Nov. 15 16:51
  • ​Tech leaders detail security strategies

    The threat of cyberattacks continues to overwhelm many organisations, and it’s simply not a matter of ‘if’ but ‘when’ corporate networks will be breached by hackers.

    Written by Byron Connolly24 Nov. 15 15:50
Tutorials about security
  • How CISOs can create security KPIs and KRIs

    If your information security functions like most, it develops copious amounts of data about the business's security that it delivers on a regular basis. And typically it never gets read.

    Written by Thor Olavsrud26 June 15 03:07
  • Closing the security loop with automated incident response

    <em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>

    Written by By Cody Cornell, founder and CEO, Swimlane06 June 15 06:51
  • Breach detection: Five fatal flaws and how to avoid them

    IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization's attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations.

    Written by By Lior Div, Co-founder and CEO, Cybereason06 June 15 00:37
  • How to use Google's new privacy and security tools

    Google stores, manages and sometimes sells an astonishingly large and complex amount of user data. Unfortunately, that digital information isn't always kept secure or private, but Google puts some degree of control in the hands of its users. To offer you a little more control, Google this week rolled out an updated online hub designed to help manage privacy settings, called My Account, as well as a pair of tools that streamline the process of safeguarding user data.

    Written by Matt Kapko03 June 15 02:51
Features about security
  • BYOD is as entrenched (and complicated) as ever

    The bring-your-own-device (BYOD) trend has been around for years now, and even though it's become a fixture at many companies, some IT shops are still grappling with how to make it work.

    Written by Matt Hamblen16 Oct. 15 20:24
  • Ashley Madison -- Can it possibly get any worse? (tl;dr: YES)

    The Ashley Madison hack continues to make headlines. Naturally, that's because the news keeps getting worse. Worse for website owners Avid Media Group. And worse for the REAL victims, more importantly -- the people named in the hacked data dump...

    Written by Richi Jennings25 Aug. 15 13:51
  • Hackers call Time on Ashley Madison -- with huge data dump

    Ashley Madison hackers released the site's user data, as threatened. Or, at least, that's what they say they've done. But it's likely that much of the data is forged or bogus in some way...

    Written by Richi Jennings19 Aug. 15 13:14
  • At what point do white hat hackers cross the ethical line?

    In recent months the news of Chris Roberts alleged hacking of an inflight entertainment system and possibly other parts of the Boeing 737 have sparked a wave of controversy. Public opinion was originally on Roberts' side, but the recent publication of the FBI affidavit changed that drastically. According to the affidavit, Roberts admitted to doing a live "pen-test" of a plane network in mid-air.

    Written by By Ondrej Krehel and Darin Andersen of Cyberunited Lifars15 Aug. 15 07:10

Whitepapers about security

Market Place