Information Security

Data security news, trends, analysis and practical advice

The working dead: IT jobs bound for extinction
the word

81p5l6fqewl. sl1500

38% off Seagate Backup Plus Ultra Slim 2TB Portable External Hard Drive - Deal Post

The Backup Plus Ultra Slim Portable Drive is one of Seagate's thinnest and most eye-catching portable hard drives

hidden door

How to deal with backdoors inserted or left by vendors

CSO looks at vendor backdoors, how they get into products, the challenges to finding these, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma.

1 threatening

7 universal rules of threat intelligence

Recorded Future will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not.

email encryption

Zix wins 5-vendor email encryption shootout

In this review, we looked at five email encryption products, four of which employ encryption gateways and one that’s end-to-end.

3 bitcoin

Would killing Bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts explain that doing away with the cybercurrency would just force cybercriminals to find another anonymous way to extort money.

security code big data cyberespionage byte

Cloudflare bug exposed passwords, other sensitive website data

For months a bug in Cloudflare's content optimization systems exposed sensitive information sent by users to websites including passwords, session cookies, authentication tokens and even private messages.

Digital Key encryption

The SHA1 hash function is now completely unsafe

Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature.

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need a plan for negotiating with people who take their data hostage.

eliminate insider threats 1

How to eliminate insider threats

Mike McKee, CEO OF ObserveIT, lists some tips to help organizations quickly jump on any irregularities that come from within your company’s network.

sandisk ixpand flash drive

33% off SanDisk iXpand Flash Drive 32GB for iPhone and iPad - Deal Alert

The perfect companion for your iPhone, the iXpand Flash Drive lets you free up space on your iPhone, back up your camera roll, and even watch videos straight from the drive4. The flexible Lightning connector works with most cases and...

binoculars looking watch outlook future

Study: 62% of security pros don’t know where their sensitive data is

Forrester report finds organizations struggle with understanding and controlling sensitive data.

05 tools

The essential guide to anti-malware tools

Admins can choose from a bevy of secondary scanners and specialized tools to clean up infected or infested PCs.

ransomware hardware security embedded circuit board integrated controller

Researchers propose a way to use your heartbeat as a password

Researchers at Binghamton State University have proposed a model that uses patients' heartbeats as an encryption key for electronic records.

01 holes

Tips on where to start in managing risk

Caroline Wong, vice president of security strategy at Cobalt, provides a few tips for managing risk in today’s modern business environment.

malware attack cyberespionage code hacker

Attackers start wiping data from CouchDB and Hadoop databases

Researchers are reporting data wiping attacks hitting openly accessible Hadoop and CouchDB deployments.

01 holes

Tips on where to start in managing risk

What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good...

backlit keyboard

How to handle security vulnerability reports

There are people out there willing to help with your company’s security issues. Isn’t it time your company had its own ‘see something, say something’ policy?

security code big data cyberespionage byte

After MongoDB attack, ransomware groups hit exposed Elasticsearch clusters

After deleting data from thousands of publicly accessible MongoDB databases, ransomware groups have started doing the same with Elasticsearch clusters that are accessible from the Internet and are not properly secured.

Load More