Traditional firewall software no longer provides meaningful security, but the latest generation now offers both client-side and network protection.
Stories by Roger A. Grimes
Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.
Quantum computers advance mean we might have only a few years before they can break all public key encryption. The day when every secret is known is near.
Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit
Online account fraud is a big, automated business. NuData Security looks at hundreds of data points to identify malicious login attempts.
These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.
Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack
Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense.
Better security automation at the OS level and via cloud services will force hackers to respond in kind.
Choose a security event information management (SEIM) vendor that helps you focus on only the security event data that needs to be investigated.
Some vendors who claim their products use artificial intelligence or machine learning technology are really using rules-based engines. Here's how to spot the lie.
The Secure Hash Algorithm version 3 fixes flaws in the now-standard SHA-2 cipher. Here's how to prepare for a migration to SHA-3 when SHA-2 is inevitably compromised.
Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.
Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments.
Most companies are not focused on the real security threats they face, leaving them ever more vulnerable. That can change if they trust their data rather than the hype.