Techworld

Security

‘Can everyone hear me now?'

Mobile threats have been with us for some time. Most organizations have done a fair job of protecting their important proprietary information, securing emails, encrypting on-board data and using mobile management tools to suppress data loss. All that has made a safer mobile world for many organizations, but certainly not foolproof.

By By Jack Gold | 09 September, 2014 22:31

Tags: data security, consumer electronics, security, smartphones, data protection

Encrypted data in the cloud? Be sure to control your own keys

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.

By Linda Musthaler | 05 September, 2014 23:45

Tags: security, cloud security, encryption

The Fappening: iCloud users, beware!

The event dubbed by the internet as "the Fappening" is the largest celebrity nude photo leak in history. Although information is still emerging as to how, why and who is at fault, don't blame Apple for this latest security disaster. Celebrity nudes are not new; I am sure that everyone remembers the controversy surrounding Paris Hilton -- and Pamela Anderson before her. What makes this different is how these photos were taken. The celebrities involved were quick to respond to the news in a variety of intriguing ways, including the following tweet from Mary E. Winstead:

By Alex Burinskiy | 05 September, 2014 05:44

Tags: Apple, Instagram, security, cloud security, internet, cloud computing, Hilton

How to avoid 10 common Active Directory mistakes

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By Rod Simmons | 27 August, 2014 05:45

Tags: Active Directory, security, Access control and authentication, application security

The trouble with trolls (and how to beat them)

A vulnerable person. A sociopath or two on social media tormenting that person without consequence. That's trolling in a nutshell.

By Mike Elgan | 16 August, 2014 21:22

Tags: Internet-based applications and services, consumer electronics, security, twitter, internet, social media, Personal Technology, privacy

Security Manager's Journal: Peering behind the firewall

The corporate firewall is like a dike keeping out a raging sea of malware. Where does it all come from?

By J.F. Rice | 11 August, 2014 23:36

Tags: security, Malware and Vulnerabilities

OkCupid -- it's not me, its you

Remember the controversy over Facebook's social experimentation, which showed how people's emotions could be toyed with by changing what they see online? Well, Facebook wasn't the only site playing with your heart. Dating site OkCupid has now acknowledged doing much the same thing. The mostly free dating service is being very open about how it manipulated members' online dating lives and offers a detailed explanation that amounts to a version of "Hey, everybody's doing it."

By Alex Burinskiy | 06 August, 2014 01:35

Tags: security, OKCupid, internet, privacy

Security Manager's Journal: A ransomware flop, thanks to security awareness

People like to ask the security manager, "What keeps you up at night?" My usual answer: "Employees." And there's good reason. About 95% of the security incidents my department responds to are a result of an employee doing the wrong thing, whether it's clicking on an evil link within an email, installing a malicious program or sending a sensitive document outside the company.

By Mathias Thurman | 31 July, 2014 23:25

Tags: security

Evan Schuman: The data dangers of free public Wi-Fi

New York's plan to turn pay phones into free Wi-Fi stations could be a template for other cities, and bad news for IT departments trying to protect corporate data and intellectual property.

By Evan Schuman | 29 July, 2014 23:04

Tags: management, wireless networking, network security, Google, security, Networking, wireless

The hidden dangers of "good enough" authentication

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By By David Hald, co-founder and chief relation officer, SMS PASSCODE | 26 July, 2014 06:11

Tags: security, Multi-factor authentication, mobile security, Volkswagen

Solidifying Microsoft Azure Security for SharePoint and SQL in the Cloud

More and more organizations are moving SharePoint and SQL workloads into Microsoft Azure in the cloud because of the simplicity of spinning up servers in the cloud, adding more capacity, decreasing capacity without having to BUY servers on-premise. What used to cost organizations $20,000, $50,000, or more in purchasing servers, storage, network bandwidth, replica disaster recovery sites, etc and delay SharePoint and SQL rollouts by weeks or month is now completely managed by spinning up virtual machines up in Azure and customizing and configuring systems in the Cloud.

By Rand Morimoto | 23 July, 2014 08:14

Tags: Microsoft Subnet, security, Microsoft, internet, cloud computing

Julia King: We're all data scientists now

It's up to each one of us to figure out what in the daily surge of data is useful, what's crap and what's truly valuable.

By Julia King | 21 July, 2014 23:22

Tags: Columbia University, applications, IT careers, big data, software, data mining

Dumping an open source Honeypot on Rachel: FTC reloads on liquidating robocallers

The Federal Trade Commission today announced the rules for its second robocall exterminating challenge, known this time as Zapping Rachel Robocall Contest. "Rachel From Cardholder Services," was a large robocall scam the agency took out in 2012.

By Michael Cooney | 19 July, 2014 06:45

Tags: robocalls, Federal Trade Commission, ftc, security, Robocall Ch

Kenneth van Wyk: We can't just blame users

Yes, users sometimes do stupid things. Some always will. But developers need to do more to save users from themselves.

By Kenneth van Wyk | 16 July, 2014 22:23

Tags: App Development, security, Malware and Vulnerabilities

Security Manager's Journal: Trapped: Building access controls go kablooey

Doors just stop working when one old PC in a storage closet dies.

By J.F. Rice | 10 July, 2014 21:51

Tags: security

Facebook is a school yard bully that's going down

Facebook has grown and evolved in recent years. In addition to connecting people online, it bombards users with unnecessary ads and useless sponsored stories. And it runs experiments on its users. Columnist Alex Burinskiy is not amused.

By Alex Burinskiy | 09 July, 2014 05:19

Tags: Internet-based applications and services, security, Princeton University, internet, social media, Facebook, privacy

Evan Schuman: What if you can't trust your inbox?

Goldman Sachs is taking Google to court to force the cloud vendor to delete an email accidentally sent to a Gmail user. The consequences of a ruling for Goldman would be devastating.

By Evan Schuman | 08 July, 2014 22:40

Tags: Google, security, goldman sachs, internet, cloud computing, cloud storage

5 things you no longer need to do for mobile security

A couple of years ago companies were dismissive of BYOD, but as they've realized that the horse left the stable, they are adopting policies and next generation technologies to help manage BYOD. They also recognize that successful mobile security requires a cooperative partnership with employees, so are working with them to determine what policy works best for both parties, allowing BYOD to become part of the enterprise mobile security framework.

By Subbu Iyer, Director of Product Management, Bluebox Security | 08 July, 2014 05:05

Tags: consumerization of IT, BYOD, security, mobile security, IT management

Board of directors will have a profound impact on cybersecurity

According to a recent article in the Wall Street Journal, corporate boards are getting much more involved in cybersecurity. What's driving this behavior? While the Target breach probably influenced this behavior, corporate boards now realize that cybersecurity has become a pervasive risk that could have an adverse impact on all businesses.

By Jon Oltsik | 08 July, 2014 05:00

Tags: Target, cybersecurity, security, wall street journal, Cisco Subnet

Facebook's icky psychology experiment is actually business as usual

Unless you've been living under a rock for the last couple weeks, you've no doubt heard about Facebook's creepy, secret, psychological experiment designed to see if negative newsfeed posts inspire more negativity -- and vice versa. I don't want to excuse Facebook's behavior, which has prompted a (sort-of) apology from Facebook COO Sheryl Sandberg, as well as an ongoing stream of condemnation and outrage from legitimate psychologists and Internet commentators. I too was weirded out by the revelations, feeling manipulated and that somehow my privacy had been unfairly invaded without my permission.

By Fredric Paul | 08 July, 2014 00:58

Tags: Internet-based applications and services, applications, security, big data, software, data mining, internet, social media, business intelligence, Facebook, privacy

Top Whitepapers

Twitter Feed

Featured Whitepapers