Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure traffic across the public internet, but organizations can also deploy it to secure their internal communications.
Josh Fruhlinger |
14 Jun |
Read more
Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here's a detailed analysis by Bitdefender of how they did it at one bank.
Lucian Constantin |
07 Jun |
Read more
The Mueller Report says the Russians planted malware on at least one Florida county system, and Florida's governor announces that two counties were hacked in 2016. Experts believe the problem could be bigger.
Cynthia Brumfield |
23 May |
Read more
A Congressional commission might soon recommend conscription of cybersecurity professionals to serve in both the military and civil service. Will the government force security pros to work for Uncle Sam?
J.M. Porup |
20 May |
Read more
Recent ransomware and other attacks underscore the value attackers see in the data stored in city and regional government systems. Here's why they are vulnerable and what they can do to reduce the threat.
Cynthia Brumfield |
01 May |
Read more
The new tools enable mobile-based options for employees to sign into corporate applications or create self-sovereign identities, access to which they control.
Lucas Mearian |
15 Apr |
Read more
Apple’s 2FA iCloud system is generally very diligent about securing your account, especially when you have two devices, but it has one key flaw.
Michael Simon |
12 Apr |
Read more
Everything you need to know about two-factor authentication so you choose the right method for every account you own.
Michael Simon |
11 Apr |
Read more
CSO50 award-winning companies are rising to the cloud security challenge and finding new ways to protect data and assets.
By CSO staff and contributors |
04 Apr |
Read more
A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike.
Josh Fruhlinger |
01 Apr |
Read more
Movies and TV shows have long influenced how lawmakers and society think about information security. We all have our personal favorite we're obsessed with. What's yours?
J.M. Porup |
29 Mar |
Read more
Metasploit is a penetration testing framework that makes hacking simple. It's an essential tool for both attackers and defenders.
J.M. Porup |
25 Mar |
Read more
After being hit with the Cryptolocker ransomware, the City of Westland realized it needed more insight into network traffic, not just at the perimeter.
Dan Swinhoe |
18 Mar |
Read more
'Cryptojacking' is a term used to describe the action of secretly using a computer to mine cryptocurrency.
By Sean Bradley |
09 Mar |
Read more
When someone in your organization starts using internet-connected devices without IT’s knowledge, that’s shadow IoT. Here's what you need to know about its growing risk.
James A. Martin |
05 Mar |
Read more
Continuing attacks on directory name services have prompted ICANN to prompt enterprise DNS uses to push their suppliers for DNSSEC services to block some of these attacks that can compromise corporate data.
Michael Cooney |
26 Feb |
Read more
Kaspersky is a fan favorite in the AV world, while Norton is a longtime brand that's not nearly as beloved. Who wins when these two suites mix it up?
Ian Paul |
13 Feb |
Read more
Spurred by government surveillance of data, the Electronic Frontier Foundation is making progress toward its goal of encrypting all internet traffic using technology and scorecards.
Cynthia Brumfield |
31 Jan |
Read more
Cisco has patched security vulnerabilities in four packages of SD-WAN Solution software that address buffer overflow and other vulnerabilities
Michael Cooney |
26 Jan |
Read more
Passwords seem like a recent thing, but they've been in use for a long time. Here are a dozen of the more memorable ones.
Phil Johnson |
23 Jan |
Read more