What is two-factor authentication, and which 2FA apps are best?
A guide to two-factor authentication and the five best 2FA apps for keeping your data safe.
A guide to two-factor authentication and the five best 2FA apps for keeping your data safe.
Users fume over extra time and effort added to their workloads because of the switch.
Gregg Keizer | 25 Apr | Read more
Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS
Fahmida Y. Rashid | 15 Aug | Read more
Machine learning and behavioral analytics could help you detect attacks faster – or stop them before they even start.
Mary Branscombe | 02 Mar | Read more
The concept of security these days goes well beyond insisting on complicated passwords. Are you sure your company is up to the task?
Mary Branscombe | 09 Nov | Read more
That’s what users are saying, shoved down their throats, with many users still having issues with the unwanted Windows 10 OS.
By David Geer | 21 Oct | Read more
Why spend time targeting Active Directory for domain credentials when Outlook Web Application is just as good -- and far easier to compromise?
Fahmida Y. Rashid | 07 Oct | Read more
With Device Guard and Credential Guard, Windows enjoys unprecedented protection from malware and advanced persistent threats
Fahmida Y. Rashid | 18 Sep | Read more
The move to agile development practices poses both challenges and opportunities to security teams -- with the challenges often dominating. But some organizations, such as the Aetna insurance company and the state of Texas, have found ways to make it work.
Maria Korolov | 27 May | Read more
There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.
David Strom | 11 Mar | Read more
It sounds like the operating system that really needs some serious security patches is the human one.
Taylor Armerding | 14 Oct | Read more
It's looking more and more likely that Microsoft Security Essentials (MSE) is warning about a Trojan:DOS/Alureon.J infection when none exists.
Woody Leonhard | 08 Oct | Read more
It's so far been another sorry, sorry year in the technology industry, with big name companies, hot startups and individuals making public mea culpas for their assorted dumb, embarrassing and other regrettable actions.
One seemingly unshakeable truth about the online world since it began is this: The Internet never forgets. Once you post anything online, it is recoverable forever -- the claims of former IRS official Lois Lerner about "lost" emails notwithstanding. Even promises of photos disappearing after a few seconds have been shown to be bogus.
Taylor Armerding | 05 Aug | Read more
By and large, the major websites hit by Heartbleed have recovered. So have the bad guys, who are undoubtedly plotting their next move. Here, security experts offer their take on five large-scale, Heartbleed-level vulnerabilities for which CIOs should prepare.
John Brandon | 10 Jun | Read more