In Pictures: Best tools for protecting passwords
Passwords are a security weak link, but these products help shield passwords from attackers
View ArticleIn Pictures: How to protect virtual machines (VMs)
These four products represent different approaches to VM security
View ArticleUnisys unveils invisibility cloak for network traffic
If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance,...
View ArticleWhy Israel could be the next cybersecurity world power
There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at...
View ArticleEmail encryption has gotten so much better, so you'd be crazy not to use it
I once co-wrote a book on enterprise email where I likened email encryption to a "sucking chest wound." That was in 1997, when you had to do all the encryption key management on your own, a daunting...
View Article9-vendor authentication roundup: The good, the bad and the ugly
New ‘smart’ tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift.
View ArticleMastering email security with DMARC, SPF and DKIM
The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.
View Article10 questions to answer before running a capture the flag (CTF) contest
Running your own CTF contest can build security skills and help identify new internal and external talent. Learn what types of challenges you need to include, how to make the contest run smoothly, and...
View ArticleWhat is Mitre's ATT&CK framework? What red teams need to know
The ATT&CK framework allows security researchers and red teams to better understand hacker threats.
View ArticleWhat is application security? A process and tools for securing software
Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become...
View Article10 Slack security tools compared
Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.
View ArticleHow to evaluate SOC-as-a-service providers
Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them.
View Article7 Top Tools for Single Sign-on
Okta, OneLogin score high in test of solutions that beef up app security and cut help desk calls.
View ArticleBest tools for single sign-on (SSO)
SSO can reduce the risk of weak passwords and administrative overhead associated with managing account access. These are the top single sign-on solutions to consider.
View ArticleWhat is Magecart? How this hacker group steals payment card data
Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.
View Article