Security
What's worse than getting hit with a security breach? Getting hit with an easily preventable one.
Articles about Security
-
Infographic: Finding the right security solution for the data center
This infographic from Cisco illustrates the issues that data centers face trying to deploy comprehensive security systems.
-
Breach Detection Systems take aim at targeted persistent attacks
You've just been told to get a Breach Detection System in place. Where do you start? How about a buyer's guide created by an independent test facility?
-
Freedom Hosting and 'torsploit': Troubles on the Onion router
The arrest of the Freedom Hosting CEO has set in motion a crisis for TOR and unleashed a java exploit designed to expose Freedom Hosting users.
-
Corporate espionage or fearmongering? The facts about hardware-level backdoors
Spying accusations against Chinese companies like Huawei have resulted in bans by US, UK, and Australian government agencies. Is there any technical merit to these charges?
-
New strain of ransomware evades detection by AV apps
Learn about a new type of ransomware that has the potential to snare many victims - and it's not even malware.
-
Review: File Scavenger 4.1
Looking for a thorough and refined file undelete app can be a challenge, but Matt Nawrocki thinks he may done just that.
-
RiskRater: An IT-security test that no one fails
Three minutes. That's it. Take the RiskRater challenge. You could save yourself, your fellow employees, and family members from a costly Internet oops.
-
Worst IT fail ever? US agency spends millions in useless security
A branch of the U.S. Commerce Department recently trashed perfectly good computers and wasted millions on a bogus malware infection. How did this happen?
-
Five must-have browser security add-ons
Make your browser secure enough to meet your business needs with these five add-ons.
-
Five Apps: Add-ons to secure your browser for business use
Make your browser secure enough to meet your business needs with these five add-ons.
-
Why security metrics aren't helping prevent data loss
Security metrics are supposedly a way for upper management and IT departments to converse intelligently about in-house security programs. Why aren't the metrics working?
-
The emergence of enterprise risk compliance
At the intersection of IT compliance and risk, new solutions are helping security professionals to prioritize where limited resources need to be directed.
-
Android's very real 'Master Key' vulnerability
Android Master Key cryptography ensures applications are not tampered with. Michael P. Kassner interviews researchers who say the crypto process is severely flawed.
-
Email encryption: Using PGP and S/MIME
For those worried about the security and privacy of email communications, encryption is one layer to add, but using encryption software isn't terribly user-friendly.
-
Band of brothers: Vendor partnerships strengthen security for all
Security vendors who band together on solutions instead of persisting in adversarial relationships with one another should be the favored providers for IT departments.
Topic Contributors
-
Michael Kassner
Michael Kassner is currently a systems manager for an international company. Together with his son, he runs MKassner Net, a small IT publication consultancy.
You can also find Michael Kassner on and Google+ .
-
Patrick Lambert
Patrick Lambert has been working in the tech industry for over 15 years, both as an online freelancer and in companies around Montreal, Canada. A fan of Star Wars, gaming, technology, and art, he writes for several sites including the art news community TideArt. He's always at the forefront of the latest happening in the world of technology. You can find him online at http://dendory.net or on Twitter at @dendory.