Menu
security

security - News, Features, and Slideshows

Most popular

security in pictures

News about security
Tutorials about security
  • How CISOs can create security KPIs and KRIs

    If your information security functions like most, it develops copious amounts of data about the business's security that it delivers on a regular basis. And typically it never gets read.

    Written by Thor Olavsrud26 June 15 03:07
  • Closing the security loop with automated incident response

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

    Written by By Cody Cornell, founder and CEO, Swimlane06 June 15 06:51
  • Breach detection: Five fatal flaws and how to avoid them

    IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization's attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations.

    Written by By Lior Div, Co-founder and CEO, Cybereason06 June 15 00:37
  • How to use Google's new privacy and security tools

    Google stores, manages and sometimes sells an astonishingly large and complex amount of user data. Unfortunately, that digital information isn't always kept secure or private, but Google puts some degree of control in the hands of its users. To offer you a little more control, Google this week rolled out an updated online hub designed to help manage privacy settings, called My Account, as well as a pair of tools that streamline the process of safeguarding user data.

    Written by Matt Kapko03 June 15 02:51
  • Digging Deeper into the Cisco ASA Firewall REST API

    Security orchestration methods and of course SDN is driving the need for programmable interfaces in  security products.  The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release.  I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities.  Thank you Mason for the great information.

    Written by Jamey Heary13 May 15 07:29
Features about security
  • How Apple's privacy stance could give Google an AI edge

    "We at Apple reject the idea that our customers should have to make tradeoffs between privacy and security," said Apple CEO Tim Cook earlier this month during an Electronic Privacy Information Center (EPIC) event where he was honored for corporate leadership. "We can and we must provide both in equal measure."

    Written by Matt Kapko24 June 15 00:42
  • Network analysis is like turning over rocks

    I just found out my company's employees have been finding ways to get around my Web filtering. And that came as a surprise, because I use a best-in-class product that employs a database to categorize and block website URLs, which I thought I could rely on. But as I found out, that product is not perfect.

    Written by By J.F. Rice20 June 15 05:06
  • How to stop the security breach tsunami

    It seems like almost every week there is a new security breach in either the government or in private business. The latest had nothing to do with China, instead it appeared to be more of a revenge attack by one baseball team on another.

    Written by Rob Enderle20 June 15 01:43
  • U.S. surveillance programs are killing the tech industry

    The Information Technology & Innovation Foundation, ranked as the most authoritative science and technology think tank in the U.S. (second in the world behind Max Planck Institutes of Germany), has just released its latest report on the impact of the existence and disclosure of the broad NSA national and international spying programs.

    Written by Rob Enderle13 June 15 00:22
  • Are retailers (and consumers) ready for EMV?

    A few weeks ago, I got two fat envelopes in the mail. Each one held a new credit card inside along with instructions on how to use that card. Then, when I stopped at my local grocery store, at Nordstrom, even the corner liquor store, each had a new reader with a slot at the bottom into which I could slide those new cards.

    Written by Jen A. Miller11 June 15 01:20

Whitepapers about security

Market Place

Computerworld
ARN
Techworld
CMO