Most popular

security in pictures

News about security
Tutorials about security
  • 5 Ways to Prevent Data Loss in Mobile Environments

    By Kim Lindros and Ed Tittel | 20 March, 2014 13:15

    Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data loss on mobile devices.

  • How to Test the Security Savvy of Your Staff

    By Kim Lindros and Ed Tittel | 24 February, 2014 13:58

    How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.

  • One tweak can make your Windows PC virtually invulnerable

    By Tony Bradley | 19 February, 2014 21:55

    Microsoft published 147 vulnerabilities in 2013 that were rated as Critical. Critical, however, is a relative term, and there is one simple thing anyone can do that would guard against almost every single Critical vulnerability according to a new report from Avecto.

  • Can a hacker use a brute-force attack to steal an online password?

    By Lincoln Spector | 17 February, 2014 17:11

    Harish Kumar asked if a brute force attack--which tries random text strings until one turns out to be your password--would work on major websites. "Will Facebook allow millions of failed attempts?"

  • Protect your PC in the web's worst neighborhoods

    By Alex Castle | 12 February, 2014 14:19

    Your data. Your wallet. Your identity. In the darker corners of the internet, it's all fair game, and disaster could be one unwitting click away. Protect yourself by learning about the web's most common dangers, and how to avoid them. Also, take some basic steps to make your PC more resistant to harm.

Features about security
  • U.S. commercial drone industry struggles to take off

    By Jaikumar Vijayan | 18 April, 2014 21:36

    The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.

  • Nine things you need to know before you store data in the Cloud

    By Jennifer Lonoff Schiff | 17 April, 2014 05:04

    The amount of electronic information (e.g., documents, images, emails, videos) organizations produce is staggering. Storing all your digital data in your data center can be expensive. That's why cloud storage -- which often comes at a fraction of the cost of storing the information on-premises -- has become increasingly popular.

  • What is HeartBleed? The biggest security threat the internet has ever seen

    By Martyn Casserly | 12 April, 2014 23:40

    The Heartbleed bug has made headlines all around the world after it was discovered that potentially two thirds of the internet was vulnerable. The erroneous code has exposed encryption keys to would-be hackers, meaning most of our sensitive data is easily stolen. We look at what this means for the future.

  • 7 all-in-one security suites: Anti-malware for all your devices

    By Preston Gralla | 04 April, 2014 01:00

    Let's face it: No matter what device you use, you're in danger. Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device -- like most of us do -- that makes it even more difficult and expensive to be vigilant and keep yourself safe.

  • Ad tracking: Is anything being done?

    By Robert L. Mitchell | 02 April, 2014 22:19

    Online tracking is on the rise, but efforts to create a practical Do Not Track policy have slowed to a crawl. Meanwhile, users and browser companies are taking matters into their own hands.

Whitepapers about security

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security That Fits

Improve the effectiveness of your security or get unique network threat discovery and remediation

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.