Assessing the U.S. power grid after Ukraine

Security in the U.S. power sector is taken very seriously. But of course security can always be tighter.

Enterprise CIOs, think it's OK to ignore SMB security holes? Think again

A new report shows a direct link between security problems in small businesses and enterprise security headaches. This happens when SMBs are suppliers or resellers for enterprises and are therefore connected.

A checklist for SaaS vendors

Our manager’s company uses a lot of third-party vendors, and some of these relationships have been in place for years. What will happen when he goes back to assess their security risks?

Does anyone really want the government deciding encryption policy?

If people spent half as much time protecting their data as they do trying to prevent the data being protected, we'd all be far better off.

A ray of hope in the fight against malvertising

A new service offers to keep all your Web browsing on its servers. It could be the answer, despite the risks of contracting with a startup.

Living the CES security farce

The new ‘enhanced’ security promised for CES turned out to be a joke, but the illusion of safety provided by security theater really fell away on the way home.

Compliance does not equal security

The effort to meet Level 1 PCI compliance reveals a new security mantra to our manager.

Security eureka moments in New York taxicabs

There’s something about a New York cab that lends itself to imparting lessons on technology and security.

Hocus-pocus! The stupidity of cybersecurity predictions

Security industry prognosticators rely more on marketing, hype, and our own bad memories than any knowledge of security past, present or future.

Data convenience isn’t a crime, but treating it as one should be

It’s self-defeating to try to protect data by treating it all as if it’s equally sensitive.

IDG Enterprise editors predict IT trends for 2016

Top editors from enterprise IT brands Computerworld, Network World, and CSO offer up their predictions for things that will happen in IT in 2016.

By Keith Shaw | 16 December, 2015 18:07

Tags: Look ahead 2016

As pre-IE11 support ends, scrambling for workarounds

For our security manager, the two big issues are the browsers his users employ, and the versions supported by the corporate website.

By By J.F. Rice | 16 December, 2015 18:00

Tags: Internet Explorer

Sometimes you have to protect your customers

Looking out for your company can mean looking beyond the perimeter.

This is why tech toys are dangerous

Toys are dangerous. I'm not talking about toys with sharp edges, toxic materials or parts that constitute a choking hazard. I'm talking about hacking -- a new threat to the safety of children. Last week, the risk got real.

Encryption backdoors will make us all more vulnerable

A backdoor mandate will render computer systems, networks and devices totally insecure, making all of us more vulnerable to the whims of criminals and terrorists.

Judge applies common sense to question of what constitutes a data breach

A breach that doesn’t result in anyone compromising any data is something like the proverbial tree that falls in the forest with no one around. Is it truly a data breach?

By Evan Schuman | 01 December, 2015 14:00

Tags: data breaches

U.S. is still tiptoeing toward EMV credit cards

At least we’re finally officially in the transition period, but it could last for years.

Anonymous just might make all the difference in attacking ISIS

The hacking group’s activities have always seemed dubious, but in this case, success will be quite welcome.

When it comes to enterprise network security, less is more

Diminishing returns in network security.

To get new initiatives done, money talks

A couple of worthwhile security initiatives will languish if staffers have no incentive to work on them. Solution? Tie them to bonus pay.

Top Whitepapers

Featured Whitepapers