Based on years of pilot projects and proofs-of-concept, the Industrial Internet Consortium has detailed the best-practices organizations can use to ensure successful deployments.
Cybercriminals posted the information of more than 10 million customers on a hacker forum a year after the initial attack on a cloud server.
Smartphone users don't want government encryption backdoors and would rather read "terms and conditions" than watch the movie "Cats."
While the concerns are legitimate, Barracuda also wants IT professionals to know that practical solutions exist.
Managers and industry leaders are beginning to address mental health in the IT world - and here are symptoms to look for and solutions to try.
A new release leverages machine learning to help companies reduce the search time they need to remain compliant in regulated industries.
Verizon is the latest to withdraw from the RSA conference in San Francisco as tech trade shows around the globe are impacted by novel coronavirus (COVID-19). Here's what you need to know.
New security tool from Bastille Networks can help security teams enforce no cell-phone zones.
Learn how to prevent Linux users from executing certain commands and confining them to their home directory by employing rbash.
Mac users, check out these five antivirus software options, which includes one antimalware app that is ideal for SMBs.
A DivvyCloud report finds 196 data breaches exposed more than 33 billion records due to environments without appropriate security.
A new PwC report reveals what customers expect when it comes to expectations of privacy surrounding their data.
Despite the growth of 5G and 4G, older network technologies beset with certain security flaws will be around for many more years, says enterprise security provider Positive Technologies.
Report suggests IT leaders think breaches are inevitable and don't have adequate risk management in place.
Hackers are going after everyone this tax season, including the companies handling our most sensitive information.
One site registered in Russia offers a coronavirus cure for $300.
There's a new version of Microsoft Edge in town based on Chromium. Here's how to manage the browser's security and privacy settings.
Consumers and employees are finally becoming more sensitive to the privacy of their data. As technology leaders it's worth getting ahead of this trend.
Unsigned firmware in WiFi adapters, USB hubs, trackpads, and other devices can be compromised by hackers, says enterprise firmware security company Eclypsium in a new report.
Cyberattacks on Mac endpoints nearly doubled over those on Windows for the first time, according to the 2020 State of Malware Report.
Interest in Kubernetes is increasing, and DevOps is losing steam, based on O'Reilly survey findings.
Microsoft can analyze dangerous emails to determine why those messages made it past your spam filters.
Researchers say hackers can alter, stop, or expose how an individual user has voted through the Voatz app.
The for-profit company wants to make absentee voting easier for members of the military, people with disabilities, and older adults, but its biggest test included only 15,000 voters.
Hackers have expanded their exploitation of the outbreak fears with hundreds of scams and operations.
The coronavirus, which has already led to the deaths of more than 1,000 people, is a topic that scammers are corrupting for their own purposes.
After running real-world tests of Android's facial recognition on a Pixel 4, Jack Wallen shares his theory of why some people are so concerned about facial recognition.
Commentary: It takes hubris to tell Jimmy Wales, the founder of Wikipedia, how to store data.
There are now billions of IoT devices in businesses across the world, prompting the need for increased security measures to protect them.
CEOs are generally from a finance/business track, rather than a technology one--why their traditional agenda and practices must change.
A Positive Technologies study finds 82% of web application vulnerabilities lie in the source code.
New Accenture study says organizations need to think beyond securing just their own enterprises and take better steps to secure their vendor ecosystems.
Hackers are adopting organized crime tactics to make billions from victims all over the globe.
The Identity Theft Resource Center warns that businesses of all sizes should be vigilant about data security. The COO offers advice about passwords, cloud security, and patch management.
The Identity Theft Recource Center warns that businesses of all sizes should be vigilant about data security.
Finding what cloud services employees are using is only half the battle: integrating Microsoft Cloud App Security and Defender Advanced Threat Protection means you can track, block or audit cloud app usage.
As an alternative to an on-site DNS server, this cloud-hosted DNS service lets you block, filter, and analyze activity across your network and devices.
Security and compliance are key factors to consider when outsourcing your data center, according to a report from data center provider US Signal.
Security automation will reshape hiring trends in both the US and the UK, according to a new report.
Facebook impersonations came in second place among phishing campaigns, followed by Microsoft, said email security firm Vade Secure.
Attacks on industrial control systems are up and code for banking trojans and ransomware is evolving the fastest.
If you don't follow these Kubernetes deployments security best practices from Portshift, your containers, their underlying technologies, and your data could be at risk.
DMARC can prevent spammers from using a trusted domain name to send junk mail, a useful tactic for the presidential campaigns and for your organization, according to security provider Valimail.
Scammers use dating sites to try to build relationships with people to get money or personal information. Here are 13 tips to protect yourself.
Hackers are using malicious emails about the coronavirus to trick people with a malware called AZORult.
Learn how to keep your iOS devices--and your data--secure with these iOS 13 privacy settings and Apple resources.
Cybercriminals are now using fears over the outbreak to steal email credentials, security officials say.
Employees who create external accounts but use them internally pose a risk to your security, says password manager company 1Password.
A survey of IT professionals finds AR and 5G bust for 2020, machine learning and DevOps on top.
If you need strong command line encryption on Linux, look no further than 7zip.
Extreme delays in reporting results shows "move fast and break things" is the wrong approach for election infrastructure, developers and business leaders say.
Quality control and standard software dev process could have prevented extended delays in reporting the results of the 2020 Iowa Caucus.
Joker was the hottest film among cybercriminals with 304 malicious files named after Batman's arch-nemesis, says security firm Kaspersky.
Data exposure is one of the biggest threats from attacks on IoT devices. A new report recommends a shift to perimeter-less security strategies.
The private videos of some Google Photos users were accidentally shared with other people. Here's how to secure online files to protect them from exposure.
Many Philips Hue smart light bulbs have a firmware flaw that leads hackers into an entire network, Check Point Research found.
Though the fourth quarter of 2019 saw a decrease in malicious activity, threats such as the Emotet malware continued to thrive, says Nuspire.
Infrastructure as code offers advantages in automating your data center management but also carries certain risks, says Unit 42, the global threat intelligence team at Palo Alto Networks.
Most of the targets in 2019 were in the gaming and gambling industries, says security company Imperva.
Mozilla offers users a service that will send alerts for account breaches associated with email addresses. Find out how to use Firefox Monitor.
Almost half of security professionals don't know where or how to use Zero Trust policies in a hybrid IT environment, says a survey commissioned by security provider Pulse Secure.
HR experts and tech leaders say organizations that skip training during a tech transition almost always pay a high price.
Get ready for consolidation risk, microbreaches, and other cybersecurity hazards, warn experts from Mimecast, the Cyber Resilience Think Tank.
A UN aviation agency uses GIS software to track transmission lines while 20 US airports set up screening centers.
The Gone Phishing Tournament tested how susceptible people are to opening fraudulent emails and entering their login information.
Cybercriminals are using global fears about the virus to spread the Emotet trojan.
High-tech security features will help keep 49ers and Chiefs fans safe during Super Bowl weekend in Miami.
Five-year old data from the site's breach is at the center of a new cryptocurrency ransom campaign, and it may be the beginning of a new trend.
Learn how to secure your iOS 13 devices and protect your privacy by tweaking the default settings.
Falling prey to a hacker because it neglected to properly patch its systems, the United Nations also failed to publicly disclose the hack. Here's how your organization can avoid the same mistakes.
How an organization handles a breach can be just as critical as protecting against one, according to Security.org.
Given the tech industry's poor track record of protecting users data and controlling its environmental impact, regulators around the globe are stepping into the void.
An investigation of airport cybersecurity found glaring gaps in security for web and mobile applications, misconfigured public clouds, Dark Web exposure and code repositories leaks.
The latest version of the BitWarden Android client supports facial recognition. Find out how to enable it.
Is a Linux SSH GUI in your future? Jack Wallen believes once you try Snowflake, there's no going back.
Data privacy is an increasing concern for companies and individuals. Learn more about what's on the landscape for 2020.
Attacks against endpoints have become more costly, up more than $2 million since 2018.
Many executives either don't know what their company's cyber defense is, lack budget, or spend too much time analyzing rather than taking action.
Here are 10 important tasks security administrators should perform to keep devices protected and secure.
Okta's annual study shows companies investing in apps and tools focused on security, data, and app development; favorites include GitHub and Zoom.
The risk management field is growing more challenging as threats evolve. How will these changing threats affect your organization in 2020?
Take this quick, multiple choice survey and tell us about your company's cybersecurity strategies for the upcoming year.
Cybercriminals created a homemade RAT that uses multiple cloud services and targets countries like Saudi Arabia, Iraq, Egypt, Libya, Algeria, and Morocco.
Learn how to avoid saving your Docker login credentials in plain text by creating an encrypted credential storage.
Learn how to secure Firefox tabs from mischief with the Don't Touch My Tabs add-on.
TechRepublic's Karen Roby talks with Radware exec Mike O'Malley about the growing security risks that accompany 5G for providers, smart cities, and the enterprise.
Budget limitations and a lack of knowledge or training are two major factors hurting many SMBs, according to a survey from Untangle.
Companies should realize that any user could be a target and use threat data to build a security awareness training program, says Proofpoint.
Organizations are moving toward next-generation cybersecurity solutions this year, but security fragmentation is a looming threat.
New guidelines show how the agency will coordinate with state officials in the event of a cyberattack on election infrastructure.
The cybercriminals behind the powerful banking malware have turned their attention to government targets like Sen. Cory Booker.
Commentary: There's a lot of hype about bug bounties, but here's some truth.
Managing multiple devices can be a full-time job. With a few tools in your arsenal, you can optimize mobile devices for zero-touch management.
Among 60,000 large companies analyzed by security ratings company BitSight, almost 90% still have Windows 7 PCs in their environment.
A security key is a good option to use for two-factor authentication when logging into certain websites.
Commentary: Users tend to stick with their preferred browser even when it works poorly for them.
With 2FA enabled on your Docker Hub account, you'll find you cannot access it with your user password from within the CLI. Jack Wallen shows you how to make this work.
Commentary: As more workloads move to the cloud, developers need help with security. Find out how the startup Cyral is helping to improve data security in the cloud.
IoT security is becoming a top-of-mind priority in the personal care industry. Essence group believes it has the solution and had it on display at CES 2020.
CES 2020: A "hacked" robot was on display to demonstrate how SigmaDots serverless architecture is poised to fend off IoT security threats.
By inserting themselves into business emails among employees, cybercriminals can trick victims into wiring money or sharing payment information, says security firm Barracuda Networks.
The most successful email lures don't promise riches, but issue imminent cybersecurity warnings or urgent office messages, a report reveals.
Security researcher Saleem Rashid "rickrolled" himself to show that the bug could be exploited in the real world to spoof security certificates on machines without Microsoft's patch.
Now that you have the Observium network monitoring platform installed, it's time to add a host.
Many organizations underestimate the value of their data to skilled and organized cybercriminals, said security provider eSentire.
Google is aiming to phase out third-party cookies in Chrome in two years, but that will have to prove palatable to users, publishers, and advertisers.
You'll be surprised at how many devices, apps, and services are associated with your Firefox cloud account. Find out how to remove them.
Designed to exploit a vulnerability in Windows 10 and Windows Server 2016 and 2019, the bug could allow an attacker to remotely access and control an infected computer.
A new report recommends that corporate boards answer four key questions on a regular basis to guide cybersecurity governance.
CES was more exciting than ever this year. Key topics included 5G, AI, IoT, robotics, Wi-Fi 6, edge computing, automation, blockchain, quantum computing, privacy, AR, and VR.
With no bug fixes or patches available for Windows 7 after Jan. 14, Veritas CIO John Abel offers tips to safeguard the PCs in your organization.
Your best bet is to finish a migration to Windows 10 ASAP, but there are other options in the interim, says content delivery company Kollective.
Check Point's December 2019 Index finds Emotet as lead malware for the third month in a row, spreading email spam, some which alleged support of the teen activist.
A Westworld-themed experience gave attendees a creepy glimpse into tech consequences of the future.
From analytics and AI to 5G and Wi-Fi 6, here's all the enterprise tech that took center stage at CES 2020.