With the recent take down of DYN and Brian Krebs’ web site, cybercriminals have found a way to use your own devices to bring the internet to its knees. Portnox’s CEO Ofer Amitai provides some ways to keep those devices safe from these attacks. Read More ▶ |
|
| White Paper: Kaseya Ever since the Health Insurance Portability and Accountability Act of 1996 (HIPAA) debuted, small and medium-size healthcare organizations have been struggling to comply. And with new rules coming out with regularity, the process becomes more rigorous all the time. This comprehensive cheat sheet outlines all the processes you should be automating right now to make the next HIPAA IT audit simpler, faster, and less scary. Read More ▶ | If you want to protect sensitive data -- especially if you’re sending it via email or via an online service -- one of these five encryption programs can help. Read More ▶ |
| Check out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of October 17th. All items are highly rated, and dramatically discounted. Read More ▶ |
| BIO-key loaned me these three models for evaluation. I tested them on two notebooks: one running Windows 10 Home, and the other Windows 10 Pro. Find out the results. Read More ▶ |
| | Cybersecurity is a priority for most businesses, but many are finding a lack of available cybersecurity talent. But not being able to hire the right candidates is no excuse to ignore your security needs. Read More ▶ |
| Cybersecurity “name and shame” practice may significantly boost global cybercrime. Read More ▶ |
| The sedentary lifestyle of a security practitioner can wreak havoc on your physical health Read More ▶ |
| Election hacking has become a key topic during this year's presidential elections, more so now that candidates and voters are being actively targeted by actors that are assumed to be acting with Russian support. In this modified edition of CSO Online's Hacked Opinions series, we explore the myths and realities of hacking an election, by speaking with a number of security experts. Read More ▶ |
| White Paper: Kaseya Banking systems are inherently distributed in multiple branch and ATM locations, as well as home banking over the internet. As the number of access points grows, so does the complexity of IT systems management. Systems need to be readily available and productive yet secure and protected from data-breach. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|