Techworld

Security

A simple cure for the cybersecurity skills shortage

An approach that has worked for centuries in all sorts of industries is just as applicable to the security field.

By Ira Winkler | 17 April, 2014 04:30

Tags: education, security, training, industry verticals, IT management, Education/Training

Latest gadgets ease the cruelty of travel

Luckily, gadget-makers understand the cruelty of travel, and are always creating new devices that help the mobile worker/road warrior ease the pain of a hotel room with few outlets, or expensive in-room Wi-Fi. Here are three gadgets I've recently tested that can help you on your next trip:

By Keith Shaw | 16 April, 2014 03:14

Tags: Networking, wireless, anti-malware

Evan Schuman: With Heartbleed, IT leaders are missing the point

If our checks and balances are so fragile that a typo can obliterate all meaningful security, we have some fundamental things to fix.

By Evan Schuman | 15 April, 2014 21:38

Tags: security, Malware and Vulnerabilities

Brace yourself, here comes the mobile appsplosion

Companies are engaged in a kind of arms race with competitors to see how many apps they can get everyone to use. But this aggressive push for more apps is going to end up giving users app fatigue.

By Mike Elgan | 12 April, 2014 21:20

Tags: Mobile/Wireless, dropbox, Networking, None, smartphones, wireless, mobile, Facebook, mobile apps, Instagram, consumer electronics, WhatsApp

Evan Schuman: Social media endangers corporate secrets

Employees can unintentionally share more than their employers want anyone to know.

By Evan Schuman | 08 April, 2014 21:33

Tags: social business, security, LinkedIn, Doo, privacy

Security Manager's Journal: A rush to XP's end of life

The end of Microsoft support is fast approaching, and the company still has a lot of machines running the old Windows operating system.

By J.F. Rice | 02 April, 2014 02:52

Tags: security, Microsoft, Windows, software, operating systems, Malware and Vulnerabilities

Evan Schuman: Resurrection of Full Disclosure mailing list is great news, if you're not a cyberthief

The alternatives to an independent list like Full Disclosure can't match it for stopping new cyberattack tactics.

By Evan Schuman | 01 April, 2014 23:50

Tags: Cybercrime and Hacking, security, Full Disclosure, beca

Evan Schuman: Wal-Mart is latest big company with mobile-app security problems

The evidence keeps mounting that companies that put out mobile apps are not paying nearly enough attention to security.

By Evan Schuman | 25 March, 2014 17:13

Tags: Walgreens, security, computerworld, mobile security, SSP, mobile apps

Security Manager's Journal: Stopping vendors from making us a Target

Thank you, Target! It's a pity that security managers have to capitalize on other organizations' misfortunes to broker change within their own enterprises, but the notorious Target breach of late last year just might get me some things I think my company has needed.

By Mathias Thurman | 24 March, 2014 14:13

Tags: security

Ron Miller: When will we start taking security seriously?

And what is going to have to happen before we see that we must set the smartest minds on coming up with newer, safer and less complicated security methods?

By Ron Miller | 24 March, 2014 10:37

Tags: Mobile/Wireless, consumer electronics, security, Networking, beca, smartphones, wireless, mobile, Target

Ron Miller: NSA can track every email, but it can't find a plane

When a world that's characterized by ubiquitous data collection and surveillance can lose sight of a jumbo jet, you start to question the worth of all that spying on us.

By Ron Miller | 17 March, 2014 16:31

Tags: malaysia airlines, National Security Agency, security, nsa, privacy

Evan Schuman: Is MasterCard's fraud program just another data grab?

It offers slightly greater payment convenience, but at what cost?

By Evan Schuman | 11 March, 2014 12:08

Tags: Mobile/Wireless, security, Networking, wireless, mobile, privacy

Security Manager's Journal: Thousands of dollars in phone calls? Management hates that.

As a security manager, I expect my company to be hit by malware infestations, data theft, denial-of-service attacks and attempts at unauthorized access. I deal with them all as they arise, and they do keep things interesting.

By Mathias Thurman | 10 March, 2014 13:49

Tags: security

Security Manager's Journal: Security flaw shakes faith in Apple mobile devices

And without remote management, getting patches onto devices scattered throughout the organization is hit or miss.

By J.F. Rice | 06 March, 2014 14:42

Tags: Mobile/Wireless, Apple, security, Networking, wireless, encryption, mobile

Reviews: HP's EliteBook 840 and Logitech's ConferenceCam CC3000e

The notebook features a lightweight yet tough finish, and the latest tech specs; up to 16GB of memory; storage options up to 1TB hard drive or 256GB SSD; 802.11ac Wi-Fi.

By Keith Shaw | 05 March, 2014 23:13

Tags: Configuration / maintenance, PC, Networking, hardware systems, wireless, Corning, intel, anti-malware, Data Center, HP

Mobile IT Roach Motel: Data checks in, but it won't check out

Even if a company were willing to expunge personal data that it had been authorized to collect, the realities of IT systems mean it probably could never completely do that.

By Evan Schuman | 04 March, 2014 13:10

Tags: Google, security, orange, privacy, Electronic Frontier Foundation

Career advice: Moving into Internet security

Premier 100 IT Leader Stuart Kippelman also answers questions on career growth.

By Stuart Kippelman | 04 March, 2014 12:58

Tags: applications, security, IT careers, Covanta Energy, software, project management, CIO

Secure smartphones are nice, but not enough

In the past week, two new ultra secure smartphones have been in the news. One is called the Blackphone. The other is called the Black phone. The difference in their names is a space. Here's what we know about the two most secure smartphones ever created.

By Mike Elgan | 01 March, 2014 12:08

Tags: consumer electronics, security, smartphones, mobile security, government, Government/Industries

Two Cool Tools to entertain the kids during winter, spring or summer vacation

Over the past few weeks we've been snowbound several times, which also included a school vacation week. With my kids asking me for the one-millionth time "What can we do, Dad?", fortunately I had two technology-related items for the column to test out, and they would also appeal to the youngsters as well as adults.

By Keith Shaw | 28 February, 2014 17:37

Tags: Apple, Networking, wireless, anti-malware

Kenneth van Wyk: Apple's big fail

It's disturbing that Apple would release an essential fix for iOS while ignoring the exact same problem in OS X.

By Kenneth van Wyk | 25 February, 2014 12:52

Tags: Mobile/Wireless, Apple, Google, security, Networking, Buffer, wireless, encryption, mobile

Top Whitepapers

Twitter Feed

Featured Whitepapers